Static task
static1
Behavioral task
behavioral1
Sample
dcf250dc8a9683cf5a3e7dfdb441b06e15b391a8c5d97b31431c650a715432a6.exe
Resource
win7-20231020-en
General
-
Target
0943d1d429a98057dbd293bd3e25acc3.bin
-
Size
5.2MB
-
MD5
c28efa4729b166da42f90c55156f77ca
-
SHA1
4621f8e22ffe7c4cad0b8caadf1f51c8bda8b1a3
-
SHA256
624fb9970754afac0c8e1db2fc6b888ad9b3f474ebdf4131e2378a20795cf2e7
-
SHA512
bd441abb66638752f2dc618708bc4093a7bb1f38bb056612e49f6311a55d86e4b8fd512a5edb3418a92a9dcf3caa6631001c53880838a11aa3358e66b64f60ef
-
SSDEEP
98304:nlXNFSmAvoNfs1iBy39fYPVy8q8wxLhcn0emkdjF3p1Mkwq0P0pkf8Pm2Mp:n/FpoyUayNfYPVuIvh1xxn08Pm2Mp
Malware Config
Signatures
Files
-
0943d1d429a98057dbd293bd3e25acc3.bin.zip
Password: infected
-
dcf250dc8a9683cf5a3e7dfdb441b06e15b391a8c5d97b31431c650a715432a6.exe.exe windows:6 windows x86
Password: infected
17bf3b3bfe3032ffd72f1bba20ec1cc9
Code Sign
63:24:4d:30:d2:a1:4a:b4:4a:ad:bd:9a:36:e4:da:5aCertificate
IssuerCN=HDD Toshiba SATA-III 10Tb HDWG460EZSTA N300 (7200rpm) 4096Mb 2.5 RtlNot Before10/12/2022, 12:00Not After11/12/2032, 12:00SubjectCN=HDD Toshiba SATA-III 10Tb HDWG460EZSTA N300 (7200rpm) 4096Mb 2.5 Rtl39:4c:25:e1:7c:a0:6d:27:a8:65:e2:3b:d9:1d:22:d4Certificate
IssuerCN=Sectigo RSA Time Stamping CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GBNot Before03/05/2023, 00:00Not After02/08/2034, 23:59SubjectCN=Sectigo RSA Time Stamping Signer #4,O=Sectigo Limited,ST=Manchester,C=GBExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
30:0f:6f:ac:dd:66:98:74:7c:a9:46:36:a7:78:2d:b9Certificate
IssuerCN=USERTrust RSA Certification Authority,O=The USERTRUST Network,L=Jersey City,ST=New Jersey,C=USNot Before02/05/2019, 00:00Not After18/01/2038, 23:59SubjectCN=Sectigo RSA Time Stamping CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GBExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
32:3b:39:7a:5b:c2:1d:0e:a5:0d:46:58:c1:95:6b:06:ba:8e:2c:97:f0:07:81:d7:9d:2d:68:6b:76:14:1d:f8Signer
Actual PE Digest32:3b:39:7a:5b:c2:1d:0e:a5:0d:46:58:c1:95:6b:06:ba:8e:2c:97:f0:07:81:d7:9d:2d:68:6b:76:14:1d:f8Digest Algorithmsha256PE Digest MatchesfalseHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
LocalAlloc
LocalFree
GetModuleFileNameW
GetProcessAffinityMask
SetProcessAffinityMask
SetThreadAffinityMask
Sleep
ExitProcess
FreeLibrary
LoadLibraryA
GetModuleHandleA
GetProcAddress
HeapAlloc
HeapFree
ExitProcess
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
EnumDisplayDevicesA
GetProcessWindowStation
GetUserObjectInformationW
advapi32
GetCurrentHwProfileW
gdi32
BitBlt
shlwapi
PathFileExistsW
winhttp
WinHttpCloseHandle
iphlpapi
GetAdaptersInfo
wininet
HttpAddRequestHeadersA
crypt32
CryptStringToBinaryA
Sections
.text Size: - Virtual size: 423KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.%‹¿/ Size: - Virtual size: 1.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.%‹¿/ Size: - Virtual size: 1.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.zip#**. Size: - Virtual size: 954KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.zip#**. Size: 1024B - Virtual size: 556B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.zip#**. Size: 5.2MB - Virtual size: 5.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 79KB - Virtual size: 120KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ