Static task
static1
Behavioral task
behavioral1
Sample
f1fc54bb55c777066c56a11c04a4ce869e2aca192af571b2908aad2cf29cd4e6.exe
Resource
win7-20231215-en
General
-
Target
f1fc54bb55c777066c56a11c04a4ce869e2aca192af571b2908aad2cf29cd4e6
-
Size
4.1MB
-
MD5
18c733d5d4d7cd4235f6293685a5c817
-
SHA1
e6454e98b5fc0ae9c4345e398f6d02fe68ff7279
-
SHA256
f1fc54bb55c777066c56a11c04a4ce869e2aca192af571b2908aad2cf29cd4e6
-
SHA512
2172fdc2d0e81c8f6285955a46f8930e7d31d08628f2246631838b04a15a60d5c6312c14c9751fceafdc1345bf0f6d4abc660e7feed910275a5888393f1eb775
-
SSDEEP
98304:Qa52ff2jzyldrDCZJjB9sVOM/6N8Rvyivcw8vqN0MrvjT18Bh:R52n2LpB+Mk6N8RKivOq6M5c
Malware Config
Signatures
Files
-
f1fc54bb55c777066c56a11c04a4ce869e2aca192af571b2908aad2cf29cd4e6.exe windows:5 windows x86 arch:x86
957bb2f4e83d79445f53e975ad73682f
Code Sign
9f:5a:f6:af:5e:bd:94:5d:30:96:ab:30:2e:58:45:fbCertificate
IssuerCN=52263d520931235736570a2402571c4021122b211102515e242235323619033a0b11,POSTALCODE=10825,ST=0b1c1115005f5c4e061704171b111712031508164d0a110f+ST=0b1c1115494a5c5305080e17100e0340021d1116090d510a0d0c455712130f510c06110f020b0a100346090b065b0e06410b06530c151c1b191457400b12055b0c0b0a070bNot Before22-12-2023 01:22Not After21-12-2024 01:22SubjectCN=52263d520931235736570a2402571c4021122b211102515e242235323619033a0b11,POSTALCODE=10825,ST=0b1c1115005f5c4e061704171b111712031508164d0a110f+ST=0b1c1115494a5c5305080e17100e0340021d1116090d510a0d0c455712130f510c06110f020b0a100346090b065b0e06410b06530c151c1b191457400b12055b0c0b0a070bcd:ce:55:1c:04:53:22:90:a4:4f:07:3c:7d:54:9c:6f:a1:86:17:e4:de:0f:f3:da:18:09:a1:90:58:14:52:c3Signer
Actual PE Digestcd:ce:55:1c:04:53:22:90:a4:4f:07:3c:7d:54:9c:6f:a1:86:17:e4:de:0f:f3:da:18:09:a1:90:58:14:52:c3Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalAddAtomA
InterlockedIncrement
EnumCalendarInfoW
OpenJobObjectA
GetCurrentProcess
GetModuleHandleW
GetCommConfig
GetProcessHeap
GetWindowsDirectoryA
SizeofResource
ReadProcessMemory
EnumResourceLanguagesA
CreateFileW
ExitThread
GetVolumePathNameA
FlushFileBuffers
InterlockedExchange
GetLastError
SetLastError
GetProcAddress
VirtualAlloc
GetComputerNameA
LoadLibraryA
OpenMutexA
WriteConsoleA
LocalAlloc
CreateHardLinkW
FindFirstVolumeMountPointW
BeginUpdateResourceA
GlobalFindAtomW
VirtualProtect
_lopen
GetVersionExA
FindAtomW
OpenFileMappingA
LCMapStringW
lstrcpyA
BackupWrite
GetFullPathNameW
InterlockedDecrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
RaiseException
RtlUnwind
HeapFree
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
TerminateProcess
IsDebuggerPresent
HeapAlloc
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapSize
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetLocaleInfoA
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
InitializeCriticalSectionAndSpinCount
GetModuleHandleA
LCMapStringA
WideCharToMultiByte
user32
SetClipboardViewer
gdi32
GetDeviceGammaRamp
Sections
.text Size: 4.0MB - Virtual size: 4.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 4.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 61KB - Virtual size: 944KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ