Static task
static1
Behavioral task
behavioral1
Sample
67251e454a6904e6f62b458f412e68ab.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
67251e454a6904e6f62b458f412e68ab.exe
Resource
win10v2004-20231215-en
General
-
Target
67251e454a6904e6f62b458f412e68ab
-
Size
997KB
-
MD5
67251e454a6904e6f62b458f412e68ab
-
SHA1
642a4d0e77aaff0662494913db3d9f7ba11d3537
-
SHA256
6be864cba0b4846d6d4c098bdde569163e912775322bf72dae8595863d58a08a
-
SHA512
abf5b62f49e45f00261b76c89f47adfef5ff060e93d92d1c3c9010eab64fd14aeca92e2af2849c45c5fb1769b8d661a8fea105696e9ce18e8b123ed46f3ae44c
-
SSDEEP
24576:DTS3yDK8vnfFH66mrKrClBhUcCnuPg/raAejBu6RL8VMoLjj7J7g:ZFH61rKrCGcy2jBu6R+9jnJ7g
Malware Config
Signatures
Files
-
67251e454a6904e6f62b458f412e68ab.exe windows:4 windows x86 arch:x86
6f74612eaf3bfb86c54ee9769537e9c5
Code Sign
26:11:0e:60:88:a1:f4:cc:d7:e8:0e:d9:e0:81:1a:70:a5:9a:e3:b7Signer
Actual PE Digest26:11:0e:60:88:a1:f4:cc:d7:e8:0e:d9:e0:81:1a:70:a5:9a:e3:b7Digest Algorithmsha1PE Digest MatchestrueHeaders
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
InitCommonControlsEx
shell32
SHGetMalloc
SHGetFileInfoW
CommandLineToArgvW
ShellExecuteW
ShellExecuteExW
SHBrowseForFolderW
SHGetPathFromIDListW
SHGetSpecialFolderLocation
kernel32
CreateFileA
FreeLibrary
GetProcessHeap
HeapAlloc
GetLastError
GetProcAddress
HeapFree
LoadLibraryW
GetModuleFileNameW
LocalFree
WaitForSingleObject
CreateProcessW
SetCurrentDirectoryW
GetCurrentDirectoryW
CloseHandle
SetFileApisToOEM
GetCurrentThread
SetPriorityClass
GetEnvironmentVariableW
SetThreadPriority
GetCurrentProcess
GetModuleHandleW
GetVersionExW
CreateFileW
ExpandEnvironmentStringsW
GetCommandLineW
GetFileAttributesW
RemoveDirectoryW
CreateDirectoryW
DeleteFileW
FindNextFileW
FindFirstFileW
FindClose
FormatMessageW
InterlockedExchangeAdd
SetEndOfFile
SetFileTime
WriteFile
GetFileSize
ReadFile
SetFilePointer
MultiByteToWideChar
WideCharToMultiByte
GetACP
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
SetFileAttributesW
GetLongPathNameW
MoveFileW
lstrlenW
GetTempPathW
GetFullPathNameW
GetWindowsDirectoryW
GetTempFileNameW
SetEvent
ResetEvent
CreateEventW
FindResourceW
FileTimeToSystemTime
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetStringTypeW
GetStringTypeA
GetLocaleInfoA
LoadLibraryA
HeapReAlloc
VirtualAlloc
FlushFileBuffers
GetConsoleMode
GetConsoleCP
LCMapStringW
LCMapStringA
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
VirtualFree
HeapCreate
HeapDestroy
WaitForMultipleObjects
ResumeThread
GetStartupInfoA
GetFileType
SetHandleCount
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetSystemTimeAsFileTime
GetVersionExA
GetStartupInfoW
ExitThread
GetCurrentThreadId
CreateThread
RaiseException
RtlUnwind
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
Sleep
HeapSize
ExitProcess
GetStdHandle
GetModuleFileNameA
GetCPInfo
GetOEMCP
IsValidCodePage
user32
LoadIconW
ScreenToClient
TranslateMessage
IsWindowVisible
EnableWindow
GetMessageW
DispatchMessageW
SetTimer
DestroyIcon
IsWindow
MessageBoxW
ShowWindow
PostMessageW
DialogBoxParamW
SetWindowPos
GetWindowRect
GetSystemMetrics
GetDlgItem
SendMessageW
EndDialog
SetFocus
GetWindowTextW
SetWindowTextW
CreateDialogParamW
IsDialogMessageW
GetActiveWindow
GetDesktopWindow
LoadStringW
PostQuitMessage
KillTimer
gdi32
CreateSolidBrush
DeleteObject
ole32
CoUninitialize
CoTaskMemFree
CoInitializeEx
CoCreateInstance
CoInitialize
Sections
.text Size: 256KB - Virtual size: 255KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 51KB - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 71KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ