Static task
static1
Behavioral task
behavioral1
Sample
5b543527b4b8a1d52a9f459a5103d435b6bc38df56af7cd42b2c28020f56098f.exe
Resource
win7-20231129-en
General
-
Target
5b543527b4b8a1d52a9f459a5103d435b6bc38df56af7cd42b2c28020f56098f
-
Size
4.2MB
-
MD5
7d4d5598fa708bdb171c82a4b720a8ab
-
SHA1
54e8db02463f8c2e763f1f4a3aac9f6bdb019c90
-
SHA256
5b543527b4b8a1d52a9f459a5103d435b6bc38df56af7cd42b2c28020f56098f
-
SHA512
0f6a64dbcb85542af858f6178b9b9d63506c447a82310bda1c2d5db62fde2e0a56698a9fdd82113a829bd4d3689946a4c4ce8688a6851b205320450d20bb3530
-
SSDEEP
98304:eonnMgHusXXbQYbgv8h6wxlh0UQ1LNwBMA:LnnMgHZsYbtk5fA
Malware Config
Signatures
Files
-
5b543527b4b8a1d52a9f459a5103d435b6bc38df56af7cd42b2c28020f56098f.exe windows:5 windows x86 arch:x86
72ef04ecccd307d1a0b4d982046e87ba
Code Sign
86:64:28:75:2e:11:ea:11:fc:a5:10:8c:c1:cd:c9:c4Certificate
IssuerCN=522a1720000d011b430433013e102d3427142b4024102b2a13264116170e10372429,POSTALCODE=10825,ST=0b1c1115005f5c4e0706040f1d15011211164f0716+ST=0b1c1115494a5c53171153050a060e05131d031c1702195d090014094753050d0f011f15150b1f1c100c1507545c1d0e011f070501080c0e5e0b0e450c12055b0c0b0a070bNot Before18-12-2023 20:40Not After17-12-2024 20:40SubjectCN=522a1720000d011b430433013e102d3427142b4024102b2a13264116170e10372429,POSTALCODE=10825,ST=0b1c1115005f5c4e0706040f1d15011211164f0716+ST=0b1c1115494a5c53171153050a060e05131d031c1702195d090014094753050d0f011f15150b1f1c100c1507545c1d0e011f070501080c0e5e0b0e450c12055b0c0b0a070bbb:d8:42:9a:df:92:e9:44:32:8e:f4:1c:58:d4:be:c3:2e:e7:c9:43:d7:13:7c:6c:34:20:e5:24:0d:49:76:97Signer
Actual PE Digestbb:d8:42:9a:df:92:e9:44:32:8e:f4:1c:58:d4:be:c3:2e:e7:c9:43:d7:13:7c:6c:34:20:e5:24:0d:49:76:97Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileA
GetNativeSystemInfo
FindFirstChangeNotificationW
EnumCalendarInfoA
EndUpdateResourceW
InterlockedIncrement
GetCurrentProcess
SetComputerNameW
GetComputerNameW
BackupSeek
GetProcessHeap
GetConsoleAliasesLengthA
GetWindowsDirectoryA
LoadLibraryW
TerminateThread
SizeofResource
GetVersionExW
Beep
EnumResourceLanguagesA
InterlockedExchange
OpenMutexW
GetLastError
SetLastError
GetFullPathNameA
VirtualAlloc
LoadLibraryA
CreateFileMappingA
LocalAlloc
FindFirstVolumeMountPointW
BeginUpdateResourceA
FindAtomA
DeviceIoControl
GlobalFindAtomW
CreateIoCompletionPort
GetModuleHandleA
VirtualProtect
SetCalendarInfoA
OpenSemaphoreW
TerminateJobObject
GlobalAddAtomW
TlsFree
LCMapStringW
lstrcpyA
GetProcAddress
GetComputerNameA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
RaiseException
RtlUnwind
GetModuleHandleW
Sleep
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
GetCPInfo
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
GetCurrentThreadId
TerminateProcess
IsDebuggerPresent
HeapAlloc
HeapFree
HeapSize
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSectionAndSpinCount
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
HeapReAlloc
user32
EnableWindow
gdi32
GetDeviceGammaRamp
winhttp
WinHttpCheckPlatform
Sections
.text Size: 4.0MB - Virtual size: 4.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 4.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 119KB - Virtual size: 939KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ