Static task
static1
Behavioral task
behavioral1
Sample
c774e053edbafa354119fe1d7c02950a9fe9df461e4e3379a65b07c335db66f7.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
c774e053edbafa354119fe1d7c02950a9fe9df461e4e3379a65b07c335db66f7.exe
Resource
win10v2004-20231020-en
General
-
Target
c774e053edbafa354119fe1d7c02950a9fe9df461e4e3379a65b07c335db66f7
-
Size
405KB
-
MD5
400ff082ec780632254cdeadb8e83e7e
-
SHA1
485b4ffcfbdf1b001d3fce9c7f1973c74148ef93
-
SHA256
c774e053edbafa354119fe1d7c02950a9fe9df461e4e3379a65b07c335db66f7
-
SHA512
59872315a1ea43296744d0e6772d1dd4012e38c15c2903ad62cc3890ba84d90cde41ee948c3d4464f5e4bff7f5ae3890a5da64820a7a00c72bf32f1bdee4aa35
-
SSDEEP
12288:ZKIjy71hlj9szAlo6cTycgnqGg533XK09bx6:ZKSy71hlj9szAlopTyDqGg5Hj8
Malware Config
Signatures
Files
-
c774e053edbafa354119fe1d7c02950a9fe9df461e4e3379a65b07c335db66f7.exe windows:6 windows x86
e808d27ee3f04e4b207949db83039c7b
Code Sign
57:54:86:e1:68:83:7e:8e:45:59:45:33:a9:e1:9f:abCertificate
Issuer0.9.2342.19200300.100.1.25=#132757696e646f777320417a757265204352502043657274696669636174652047656e657261746f72Not Before05/04/2023, 12:28Not After05/04/2024, 12:28Subject0.9.2342.19200300.100.1.25=#132757696e646f777320417a757265204352502043657274696669636174652047656e657261746f7201:c2:9c:7a:f4:7a:a6:02:58:0e:af:32:b1:23:b1:1dCertificate
IssuerCN=GlobalSign Timestamping CA - SHA384 - G4,O=GlobalSign nv-sa,C=BENot Before06/04/2022, 07:44Not After08/05/2033, 07:44SubjectCN=Globalsign TSA for Advanced - G4,O=GlobalSign nv-sa,C=BEExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
01:ec:1c:92:40:de:fd:2e:40:5d:7c:47:74Certificate
IssuerCN=GlobalSign,OU=GlobalSign Root CA - R6,O=GlobalSignNot Before20/06/2018, 00:00Not After10/12/2034, 00:00SubjectCN=GlobalSign Timestamping CA - SHA384 - G4,O=GlobalSign nv-sa,C=BEKey Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
01:f2:40:42:40:ce:fd:22:db:e9:6c:71:fcCertificate
IssuerCN=GlobalSign,OU=GlobalSign Root CA - R3,O=GlobalSignNot Before20/02/2019, 00:00Not After18/03/2029, 10:00SubjectCN=GlobalSign,OU=GlobalSign Root CA - R6,O=GlobalSignKey Usages
KeyUsageCertSign
KeyUsageCRLSign
04:00:00:00:00:01:21:58:53:08:a2Certificate
IssuerCN=GlobalSign,OU=GlobalSign Root CA - R3,O=GlobalSignNot Before18/03/2009, 10:00Not After18/03/2029, 10:00SubjectCN=GlobalSign,OU=GlobalSign Root CA - R3,O=GlobalSignKey Usages
KeyUsageCertSign
KeyUsageCRLSign
ac:5f:62:b7:a6:e8:00:f9:f9:f8:79:18:42:67:2c:f0:51:2c:96:dc:7b:ad:fd:00:e3:37:73:95:7b:c8:20:05Signer
Actual PE Digestac:5f:62:b7:a6:e8:00:f9:f9:f8:79:18:42:67:2c:f0:51:2c:96:dc:7b:ad:fd:00:e3:37:73:95:7b:c8:20:05Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
msi
ord224
crypt32
CertFreeCertificateContext
CertGetNameStringW
kernel32
FindResourceExW
CreateFileW
CloseHandle
FindClose
DeleteFileW
FindNextFileW
GetFileAttributesW
CreateDirectoryW
WriteFile
SetFilePointer
GetModuleHandleW
GetWindowsDirectoryW
GetTempPathW
GetTempFileNameW
MoveFileW
GetCurrentProcess
GetSystemDirectoryW
LoadLibraryExW
CreateToolhelp32Snapshot
HeapFree
OpenProcess
Process32NextW
GetProcessTimes
GetCurrentProcessId
GetExitCodeProcess
WaitForSingleObject
LoadResource
ReadProcessMemory
Sleep
SetLastError
ExitProcess
lstrcmpiW
GetModuleFileNameW
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
OutputDebugStringW
GetCurrentThreadId
FlushFileBuffers
GetStringTypeW
InitializeCriticalSectionEx
DecodePointer
GetCommandLineW
InitializeSListHead
WriteConsoleW
GetConsoleMode
GetConsoleOutputCP
SetFilePointerEx
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapReAlloc
GetSystemTimeAsFileTime
HeapSize
HeapDestroy
MultiByteToWideChar
WideCharToMultiByte
FreeLibrary
GetProcAddress
LoadLibraryW
LocalAlloc
GetLastError
LocalFree
FindResourceW
SizeofResource
LockResource
GetProcessHeap
TerminateProcess
HeapAlloc
RtlUnwind
Process32FirstW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
GetTimeZoneInformation
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
QueryPerformanceCounter
GetStartupInfoW
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
GetFileType
GetStdHandle
GetModuleHandleExW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
IsDebuggerPresent
RaiseException
FormatMessageA
GetLocaleInfoEx
EncodePointer
LCMapStringEx
CompareStringEx
GetCPInfo
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
WakeAllConditionVariable
SleepConditionVariableSRW
UnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
user32
EnumWindows
SetWindowPos
GetForegroundWindow
GetWindowThreadProcessId
GetWindowLongW
AllowSetForegroundWindow
advapi32
SetEntriesInAclW
RegQueryValueExW
RegOpenKeyExW
ConvertSidToStringSidW
FreeSid
EqualSid
AllocateAndInitializeSid
GetTokenInformation
OpenProcessToken
LookupAccountSidW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
GetSecurityDescriptorDacl
shell32
ShellExecuteExW
ShellExecuteW
ole32
CoCreateInstance
CoInitialize
CoAllowSetForegroundWindow
CoUninitialize
oleaut32
VariantInit
SysAllocString
SysFreeString
VariantClear
shlwapi
ord176
PathFileExistsW
PathIsUNCW
Sections
.text Size: 302KB - Virtual size: 301KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 70KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ