Static task
static1
Behavioral task
behavioral1
Sample
e20c1c330fa7c56cbddfbd601616d1036c248ef7a7155dca5782984e83472b9d.exe
Resource
win7-20231215-en
General
-
Target
e20c1c330fa7c56cbddfbd601616d1036c248ef7a7155dca5782984e83472b9d
-
Size
4.1MB
-
MD5
b97c3b6f1c28835d5cecfd2f55343a57
-
SHA1
eab8bfb89c2a468415b183f3d083e3e4315773d7
-
SHA256
e20c1c330fa7c56cbddfbd601616d1036c248ef7a7155dca5782984e83472b9d
-
SHA512
98b512021dcf9aed90e7c7db0c0ddd4b04a7e555835704efaa746baba2351a554f244fd3087e087a4e82747fc0294ece7937fd272a4c431de43a295a5906fa2c
-
SSDEEP
98304:eZSwJ0d3nQGphocDlkC1mwRtcV+xuVS81yLxbFaM7mmTCh7sduN0aKyFUbk9ju:elJ23np+cucmwRtclSnLxBaM7mBhRsyW
Malware Config
Signatures
Files
-
e20c1c330fa7c56cbddfbd601616d1036c248ef7a7155dca5782984e83472b9d.exe windows:5 windows x86 arch:x86
a4c8c5db1379e8d0f3f943dc9ffbeaaf
Code Sign
47:7b:c6:68:f5:f6:99:37:7c:4c:90:7b:e1:95:e6:fdCertificate
IssuerCN=522303292b2005041027200a5d5d12051031230d161c143d24542553452740323d28,POSTALCODE=10820,ST=0b1c1115005f5c4e061704171b0617160407045b0c1704+ST=0b1c1115494a5c11101704105c1f07410b17550d0e1c0c5a070a090e025212541c510f17091909155406121d141b0850180d0a16140e53100100171b1d12055b0c0b0a070bNot Before26/12/2023, 01:04Not After25/12/2024, 01:04SubjectCN=522303292b2005041027200a5d5d12051031230d161c143d24542553452740323d28,POSTALCODE=10820,ST=0b1c1115005f5c4e061704171b0617160407045b0c1704+ST=0b1c1115494a5c11101704105c1f07410b17550d0e1c0c5a070a090e025212541c510f17091909155406121d141b0850180d0a16140e53100100171b1d12055b0c0b0a070b35:fb:a6:21:d6:ce:0f:f1:64:12:63:a0:de:83:d4:16:ec:0b:c8:4b:19:9b:bc:bc:05:5c:85:07:e9:25:b8:79Signer
Actual PE Digest35:fb:a6:21:d6:ce:0f:f1:64:12:63:a0:de:83:d4:16:ec:0b:c8:4b:19:9b:bc:bc:05:5c:85:07:e9:25:b8:79Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateHardLinkA
BackupSeek
GetModuleHandleW
GetProcessHeap
GetVolumePathNameW
GlobalFindAtomA
LoadLibraryW
SizeofResource
CreateFileW
ExitThread
InterlockedExchange
GetLastError
SetLastError
GetProcAddress
VirtualAlloc
BeginUpdateResourceW
OpenMutexA
WriteConsoleA
LocalAlloc
DnsHostnameToComputerNameA
GetComputerNameW
BeginUpdateResourceA
GetCommMask
AddAtomA
OpenJobObjectW
DeviceIoControl
FindFirstVolumeMountPointA
VirtualProtect
_lopen
GetVersionExA
FindAtomW
GetWindowsDirectoryW
EnumResourceLanguagesW
OpenFileMappingA
SuspendThread
LCMapStringW
lstrcpyA
EnumCalendarInfoA
InterlockedIncrement
RemoveDirectoryW
DebugActiveProcess
InterlockedDecrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetStartupInfoW
RaiseException
RtlUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
HeapFree
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
HeapAlloc
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapSize
HeapReAlloc
GetLocaleInfoA
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
LCMapStringA
WideCharToMultiByte
LoadLibraryA
InitializeCriticalSectionAndSpinCount
user32
WindowFromDC
GetCaretPos
gdi32
GetDeviceGammaRamp
advapi32
BackupEventLogA
Sections
.text Size: 4.0MB - Virtual size: 4.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 4.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 21KB - Virtual size: 957KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ