Static task
static1
Behavioral task
behavioral1
Sample
3995ee4efe5ae91b3d92930eb8fe2145.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3995ee4efe5ae91b3d92930eb8fe2145.exe
Resource
win10v2004-20231215-en
General
-
Target
3995ee4efe5ae91b3d92930eb8fe2145
-
Size
127KB
-
MD5
3995ee4efe5ae91b3d92930eb8fe2145
-
SHA1
856c624a1157ec08062a1f988aed558ab63aff93
-
SHA256
a126427248c2bb73c43b76aa99c92bfef0c39dba1ec1b49229970c4213a8eac7
-
SHA512
7d410d2c0cebfd8e2c3a62f9c0082ac31771dcf4ee066d70051f7a03b35cfa06c8c233a63dc057bf70dca9aea9eb346fe193826e60025b0591c36c45f3884df5
-
SSDEEP
3072:l+PW4JM+Stn/eLjksVfepRM45uoF8FS1U:laTyn/eLjrfepufoF8g1U
Malware Config
Signatures
Files
-
3995ee4efe5ae91b3d92930eb8fe2145.exe windows:5 windows x86 arch:x86
dabeb36cbc495abdfc06ce219e779583
Code Sign
04Certificate
IssuerCN=KISA RootCA 1,OU=Korea Certification Authority Central,O=KISA,C=KRNot Before24/08/2005, 08:05Not After24/08/2025, 08:05SubjectCN=KISA RootCA 1,OU=Korea Certification Authority Central,O=KISA,C=KR03:afCertificate
IssuerCN=yessignCA General Class 2,OU=AccreditedCA,O=yessign,C=krNot Before03/06/2010, 15:00Not After04/06/2011, 14:59SubjectCN=스카이테크(Skytech),OU=code-sign+OU=20100604000001,O=yessign,C=krExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
27:84Certificate
IssuerCN=KISA RootCA 1,OU=Korea Certification Authority Central,O=KISA,C=KRNot Before30/04/2010, 01:50Not After30/04/2020, 01:50SubjectCN=yessignCA General Class 2,OU=AccreditedCA,O=yessign,C=krKey Usages
KeyUsageCertSign
KeyUsageCRLSign
Signer
Actual PE DigestDigest AlgorithmPE Digest MatchesfalseHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateMutexA
ExpandEnvironmentStringsA
CreateDirectoryA
GetWindowsDirectoryA
MoveFileA
lstrlenA
ReleaseMutex
lstrcpyW
lstrcatW
Sleep
ReadFile
SetEndOfFile
LCMapStringW
GetCommandLineA
InterlockedDecrement
lstrlenW
WideCharToMultiByte
LCMapStringA
GetStringTypeW
GetStringTypeA
GetLocaleInfoA
FlushFileBuffers
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
MultiByteToWideChar
WriteConsoleA
CreateFileA
SetFilePointer
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
HeapSize
LoadLibraryA
InitializeCriticalSectionAndSpinCount
GetModuleHandleA
GetSystemTimeAsFileTime
HeapFree
GetProcessHeap
GetLastError
HeapAlloc
GetStartupInfoW
RaiseException
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualFree
VirtualAlloc
HeapReAlloc
HeapCreate
GetModuleHandleW
GetProcAddress
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
RtlUnwind
GetConsoleCP
GetConsoleMode
CloseHandle
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
user32
wsprintfA
PostMessageW
FindWindowA
advapi32
RegCloseKey
RegSetValueExW
RegCreateKeyExW
shell32
SHGetPathFromIDListA
SHGetSpecialFolderLocation
ShellExecuteA
ole32
CoCreateInstance
CoUninitialize
OleRun
CoInitialize
oleaut32
GetErrorInfo
SysFreeString
VariantClear
iphlpapi
GetAdaptersInfo
ws2_32
recv
gethostbyname
socket
closesocket
__WSAFDIsSet
select
connect
ioctlsocket
htons
WSAStartup
WSACleanup
send
netapi32
Netbios
Sections
.text Size: 71KB - Virtual size: 71KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ