Static task
static1
Behavioral task
behavioral1
Sample
d21cbe21e38b385a41a68c5e6dd32f4c.exe
Resource
win7-20231023-en
General
-
Target
d21cbe21e38b385a41a68c5e6dd32f4c.exe
-
Size
4.2MB
-
MD5
0170c26411b59ecf071ffc70845ea165
-
SHA1
502b50729bd4e51505c16af8a1b868b0580c267b
-
SHA256
be80bbb483b095d8dd749ad6b321539d5615823bdf2e4c5865c2411081a18c47
-
SHA512
b7106bd7f1d54ff5020c9cb98a2e640872d59f66a025f9dc9ddfaccc68f9b944a952f6bb2079b4e2df35cf3556fc9999df1f186cc4a169fbc8ec7f8334f2a0e4
-
SSDEEP
98304:mkiZGwIB1dt+0CwQfqt+LbrNwxxujFg72jYYPbxh:mkikw8dt+0C/IMhwxgi72jYY
Malware Config
Signatures
Files
-
d21cbe21e38b385a41a68c5e6dd32f4c.exe.exe windows:5 windows x86
8fe9f4ba5ce72575b655c73f54ba4c3c
Code Sign
b3:5a:2f:67:d3:a1:8a:bc:2d:5e:f3:4f:4f:d1:6e:77Certificate
IssuerCN=522303292b2005041027200a5d5d12051031230d161c143d24542553452740323d28,POSTALCODE=10826,ST=0b1c1115005f5c4e061704171b0617160407045b0c1704+ST=0b1c1115494a5c11101704105c1f07410b17550d0e1c0c5a070a090e025212541c510f17091909155406121d141b0850180d0a16140e53100100171b1d12055b0c0b0a070bNot Before10/11/2023, 08:11Not After09/11/2024, 08:11SubjectCN=522303292b2005041027200a5d5d12051031230d161c143d24542553452740323d28,POSTALCODE=10826,ST=0b1c1115005f5c4e061704171b0617160407045b0c1704+ST=0b1c1115494a5c11101704105c1f07410b17550d0e1c0c5a070a090e025212541c510f17091909155406121d141b0850180d0a16140e53100100171b1d12055b0c0b0a070b72:c5:22:d4:cd:79:5e:e7:1a:3c:64:dd:6c:a4:a2:e0:98:44:9a:17:50:fc:61:78:68:71:11:c8:a5:a9:11:c6Signer
Actual PE Digest72:c5:22:d4:cd:79:5e:e7:1a:3c:64:dd:6c:a4:a2:e0:98:44:9a:17:50:fc:61:78:68:71:11:c8:a5:a9:11:c6Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteConsoleInputW
lstrlenA
GetConsoleAliasesLengthW
EnumDateFormatsExW
GetConsoleAliasExesA
GetDriveTypeW
_llseek
WriteConsoleOutputCharacterA
BuildCommDCBAndTimeoutsA
WriteConsoleOutputW
HeapAlloc
DeleteVolumeMountPointA
InterlockedIncrement
VerSetConditionMask
OpenJobObjectA
GetCommState
GetConsoleAliasA
InterlockedDecrement
GetCurrentProcess
GetSystemWindowsDirectoryW
QueryDosDeviceA
HeapFree
GetEnvironmentStringsW
AddConsoleAliasW
OpenSemaphoreA
CreateHardLinkA
SleepEx
GetFileAttributesExA
_lclose
SetTapeParameters
MoveFileWithProgressA
GetModuleHandleW
GetCommConfig
CreateNamedPipeW
LocalFlags
FindNextVolumeMountPointA
GetConsoleAliasesLengthA
ConvertFiberToThread
ExpandEnvironmentStringsA
ReadConsoleW
WaitNamedPipeW
GetUserDefaultLangID
SetCommState
GetCommandLineA
CreateActCtxW
CreateDirectoryExW
GetDriveTypeA
GetVolumePathNameW
GetCurrencyFormatW
ActivateActCtx
GlobalAlloc
SetFileShortNameW
LoadLibraryW
GetConsoleMode
GetLocaleInfoW
FatalAppExitW
_hread
GetCalendarInfoW
GetSystemWindowsDirectoryA
SetConsoleCP
InterlockedPopEntrySList
GetFileAttributesA
GlobalFlags
HeapCreate
EnumSystemCodePagesA
SetTimeZoneInformation
SetSystemPowerState
WritePrivateProfileSectionW
TerminateProcess
SetLocaleInfoA
GetSystemDirectoryA
CreateFileW
lstrlenW
FindNextVolumeMountPointW
ReplaceFileA
GlobalUnlock
DisconnectNamedPipe
GetTempPathW
GetNamedPipeHandleStateW
EnumSystemLocalesA
GetPrivateProfileIntW
GetConsoleOutputCP
VerifyVersionInfoW
GlobalUnfix
SetThreadLocale
GetCurrentDirectoryW
GetProcAddress
RemoveDirectoryA
SetComputerNameA
VerLanguageNameW
GlobalGetAtomNameA
GetProcessVersion
GetPrivateProfileStringA
OpenWaitableTimerA
Process32FirstW
IsWow64Process
BuildCommDCBAndTimeoutsW
AddAtomW
CreateEventW
SetThreadIdealProcessor
FoldStringA
GlobalFindAtomW
FindNextFileA
_lread
GetModuleHandleA
CancelIo
GetProcessAffinityMask
FindNextFileW
GetStringTypeW
VirtualProtect
CompareStringA
GetConsoleCursorInfo
QueryPerformanceFrequency
GetShortPathNameW
SetCalendarInfoA
SetProcessShutdownParameters
ReadConsoleInputW
FindAtomW
GetWindowsDirectoryW
MoveFileWithProgressW
GetTempPathA
ReadConsoleOutputCharacterW
InterlockedPushEntrySList
TlsFree
EnumSystemLocalesW
DeleteFileA
GetVolumeInformationW
lstrcpyA
WriteConsoleW
FlushFileBuffers
GetConsoleCP
SetStdHandle
IsValidLocale
GetLocaleInfoA
FindFirstFileW
SetThreadContext
DebugActiveProcess
GetVolumeNameForVolumeMountPointA
GetCompressedFileSizeA
ExitProcess
GetUserDefaultLCID
IsValidCodePage
GetOEMCP
GetACP
HeapSize
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
EncodePointer
DecodePointer
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetLastError
MoveFileA
HeapReAlloc
GetCommandLineW
HeapSetInformation
GetStartupInfoW
RaiseException
RtlUnwind
WideCharToMultiByte
LCMapStringW
MultiByteToWideChar
GetCPInfo
IsProcessorFeaturePresent
WriteFile
GetStdHandle
GetModuleFileNameW
SetFilePointer
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TlsAlloc
TlsGetValue
TlsSetValue
SetLastError
GetCurrentThreadId
FreeEnvironmentStringsW
CloseHandle
user32
CharToOemBuffA
GetDlgCtrlID
CharUpperW
DrawCaption
GetAltTabInfoA
gdi32
GetCharWidthFloatA
advapi32
ClearEventLogA
RevertToSelf
InitiateSystemShutdownA
AbortSystemShutdownW
shell32
DragAcceptFiles
ole32
CoGetInstanceFromFile
winhttp
WinHttpGetProxyForUrl
WinHttpWriteData
WinHttpReadData
WinHttpOpen
Sections
.text Size: 4.1MB - Virtual size: 4.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 19KB - Virtual size: 3.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 62KB - Virtual size: 1.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ