Static task
static1
Behavioral task
behavioral1
Sample
f04c8626900622bb3ca6a38c44f66a582e4850713cf46da0bca796da7cabccda.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
f04c8626900622bb3ca6a38c44f66a582e4850713cf46da0bca796da7cabccda.exe
Resource
win10v2004-20231023-en
General
-
Target
f04c8626900622bb3ca6a38c44f66a582e4850713cf46da0bca796da7cabccda
-
Size
1.7MB
-
MD5
969e3cfaf8c9210547fee5b8c424ba6b
-
SHA1
a67b5be1bb6d2b0e00101c9f3bde73814b7fa4b1
-
SHA256
f04c8626900622bb3ca6a38c44f66a582e4850713cf46da0bca796da7cabccda
-
SHA512
7409b6d4dda05cfa4426f1252756af0c751dec1946bfb64d7acf100a77be3c38ea4c09e52a28121b0e117ab7692a5a05f3255d97aa17586c8ab72b121794efcb
-
SSDEEP
49152:pHgYhIE7g028P1BNvLl7hBDaPBTuHrJ8iNf2Mi:p7hIE0N81vLl7hVE
Malware Config
Signatures
Files
-
f04c8626900622bb3ca6a38c44f66a582e4850713cf46da0bca796da7cabccda.exe windows:5 windows x86 arch:x86
725744a7900a337fbca77d4e1be9cc61
Code Sign
52:4b:ea:39:cb:1f:ea:67:b1:d8:55:5b:74:7f:59:7cCertificate
IssuerCN=GLL ZZCSNot Before26-09-2023 09:44Not After31-12-2039 23:59SubjectCN=GLL ZZCSe1:3b:04:8e:1b:f5:fd:22:44:8e:a2:4c:26:b9:4b:c3:e1:f4:5d:c7Signer
Actual PE Digeste1:3b:04:8e:1b:f5:fd:22:44:8e:a2:4c:26:b9:4b:c3:e1:f4:5d:c7Digest Algorithmsha1PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
htonl
gethostbyname
getservbyname
shutdown
gethostname
ioctlsocket
sendto
recvfrom
listen
accept
freeaddrinfo
getaddrinfo
WSAIoctl
socket
setsockopt
ntohs
htons
getsockopt
getsockname
getpeername
connect
closesocket
bind
send
recv
WSASetLastError
select
__WSAFDIsSet
WSAGetLastError
WSACleanup
WSAStartup
wldap32
ord33
ord46
ord211
ord60
ord50
ord301
ord200
ord30
ord79
ord35
ord143
ord32
ord27
ord26
ord22
ord41
shlwapi
PathRemoveFileSpecA
PathFileExistsA
StrToIntA
kernel32
ReadConsoleW
GetACP
HeapFree
HeapReAlloc
HeapAlloc
SetConsoleMode
ReadConsoleInputA
GetConsoleMode
SetConsoleCtrlHandler
ExitProcess
SetFilePointerEx
GetModuleHandleExW
FreeLibraryAndExitThread
CreateFileW
GetDriveTypeW
GetCurrentDirectoryW
GetModuleFileNameA
DeleteFileA
Process32First
FindFirstFileA
EnterCriticalSection
GetCommandLineW
GetCurrentProcess
TerminateProcess
FindNextFileA
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
FindClose
WaitForSingleObject
GetFileAttributesW
GetModuleHandleA
OpenProcess
SetCurrentDirectoryA
GetCommandLineA
CreateToolhelp32Snapshot
MultiByteToWideChar
GetLastError
GetFileAttributesA
MoveFileExA
Process32Next
CloseHandle
WritePrivateProfileStringA
GetProcAddress
RemoveDirectoryA
DeleteCriticalSection
CreateProcessW
WideCharToMultiByte
lstrcmpiA
CreateDirectoryA
GetPrivateProfileStringA
GetConsoleCP
Sleep
EnumSystemLocalesW
GetCurrentProcessId
CreateEventA
GetExitCodeProcess
ExitThread
TerminateThread
CreateThread
GetThreadContext
SetThreadContext
SetLastError
FormatMessageA
GetTickCount
InitializeCriticalSection
SleepEx
FreeLibrary
WaitForMultipleObjects
GetFileType
GetStdHandle
ReadFile
PeekNamedPipe
VerSetConditionMask
LoadLibraryA
GetSystemDirectoryA
VerifyVersionInfoA
GetSystemTime
SystemTimeToFileTime
WriteFile
GetCurrentThreadId
QueryPerformanceCounter
GlobalMemoryStatus
FlushConsoleInputBuffer
LoadLibraryExW
RtlUnwind
RaiseException
InitializeSListHead
GetStartupInfoW
IsDebuggerPresent
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
WaitForSingleObjectEx
ResetEvent
SetEvent
GetCPInfo
GetStringTypeW
GetLocaleInfoW
LCMapStringW
CompareStringW
GetModuleHandleW
GetSystemTimeAsFileTime
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
CreateEventW
IsValidLocale
SetErrorMode
GetUserDefaultLCID
GetTimeZoneInformation
FlushFileBuffers
GetFileAttributesExW
SetStdHandle
SetEndOfFile
GetProcessHeap
FindFirstFileExA
IsValidCodePage
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
WriteConsoleW
DecodePointer
EncodePointer
FileTimeToSystemTime
GetFullPathNameW
SetEnvironmentVariableA
HeapSize
SystemTimeToTzSpecificLocalTime
user32
GetProcessWindowStation
GetMessageA
DispatchMessageA
GetWindowRect
GetSystemMetrics
GetUserObjectInformationW
SetTimer
MessageBoxA
CreateWindowExA
TranslateMessage
SendMessageA
PostQuitMessage
RegisterClassExA
UpdateWindow
BeginPaint
EndPaint
RegisterClassExW
LoadIconA
DefWindowProcA
ShowWindow
advapi32
AllocateAndInitializeSid
ReportEventA
RegisterEventSourceA
DeregisterEventSource
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
FreeSid
CheckTokenMembership
shell32
ShellExecuteExA
CommandLineToArgvW
psapi
GetModuleFileNameExA
EnumProcessModules
comctl32
ord17
Sections
.text Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 348KB - Virtual size: 348KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 39KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 1024B - Virtual size: 620B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 57KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ