Static task
static1
Behavioral task
behavioral1
Sample
d88b6f6f2f61711c50200b041316cbaf264c549154a9236ed39c71c45fc6d399.exe
Resource
win7-20231215-en
General
-
Target
d88b6f6f2f61711c50200b041316cbaf264c549154a9236ed39c71c45fc6d399
-
Size
4.2MB
-
MD5
1f45679326fdf5d47d7a0719723e1fcf
-
SHA1
75ec4bc660d48afbcb55ea377a184c5688f23694
-
SHA256
d88b6f6f2f61711c50200b041316cbaf264c549154a9236ed39c71c45fc6d399
-
SHA512
3c876816ad0ea7d3b400eca4cc1db3b08a7133f62a677d6703cd57fdb61f0883a52adb7da692fbfd9a67a243e3f6ec01b90ce27274051d043da2ab08e094e041
-
SSDEEP
98304:KCxHw/bQRSDHJPRBSJh2kX/7RA4ZdK9n4yLvIokLVESCFlA86CnyRJ:KuwuSDHJPRkJhHVFD24yLQoiE77nEJ
Malware Config
Signatures
Files
-
d88b6f6f2f61711c50200b041316cbaf264c549154a9236ed39c71c45fc6d399.exe windows:5 windows x86 arch:x86
8f993b896626097f138ac36dad26e14c
Code Sign
bc:db:9e:32:a8:96:74:4c:92:e2:a9:1e:3d:95:71:60Certificate
IssuerCN=525c3d3f1b06302b310410391d3f23471542520105293b2253150610173842041410,POSTALCODE=10820,ST=0b1c1115005f5c4e111608130d1716070407125b0c1704+ST=0b1c1115494a5c024150110d05170e09031e0a1f1a0150025113451d111807075354195315000e091843540114031f0f4053060e0414150c0210571f0a0a055b0c0b0a070bNot Before19/12/2023, 00:39Not After18/12/2024, 00:39SubjectCN=525c3d3f1b06302b310410391d3f23471542520105293b2253150610173842041410,POSTALCODE=10820,ST=0b1c1115005f5c4e111608130d1716070407125b0c1704+ST=0b1c1115494a5c024150110d05170e09031e0a1f1a0150025113451d111807075354195315000e091843540114031f0f4053060e0414150c0210571f0a0a055b0c0b0a070b13:11:34:20:4f:de:cb:b0:8d:06:bd:b6:c1:a6:94:1d:c4:c9:1f:0f:3c:20:b5:b4:ea:64:07:4d:8d:7c:cb:b9Signer
Actual PE Digest13:11:34:20:4f:de:cb:b0:8d:06:bd:b6:c1:a6:94:1d:c4:c9:1f:0f:3c:20:b5:b4:ea:64:07:4d:8d:7c:cb:b9Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindFirstChangeNotificationW
EnumCalendarInfoA
GlobalAddAtomA
EndUpdateResourceW
InterlockedIncrement
GetCurrentProcess
SetComputerNameW
GetComputerNameW
BackupSeek
GetProcessHeap
GetConsoleAliasesLengthA
LoadLibraryW
TerminateThread
SizeofResource
GetVersionExW
Beep
EnumResourceLanguagesA
GetOverlappedResult
InterlockedExchange
OpenMutexW
GetLastError
GetNativeSystemInfo
GetProcAddress
VirtualAlloc
CreateFileMappingA
LocalAlloc
FindFirstVolumeMountPointW
BeginUpdateResourceA
FindAtomA
DeviceIoControl
GlobalFindAtomW
GetModuleHandleA
VirtualProtect
SetCalendarInfoA
OpenSemaphoreW
TerminateJobObject
GetWindowsDirectoryW
TlsFree
LCMapStringW
lstrcpyA
GetFullPathNameA
CreateFileA
SetLastError
GetComputerNameA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
RaiseException
RtlUnwind
GetModuleHandleW
Sleep
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
GetCPInfo
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
GetCurrentThreadId
TerminateProcess
IsDebuggerPresent
HeapAlloc
HeapFree
HeapSize
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
LoadLibraryA
InitializeCriticalSectionAndSpinCount
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
HeapReAlloc
user32
EnableWindow
gdi32
GetDeviceGammaRamp
advapi32
BackupEventLogW
winhttp
WinHttpCheckPlatform
Sections
.text Size: 4.0MB - Virtual size: 4.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 4.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 120KB - Virtual size: 939KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ