Static task
static1
Behavioral task
behavioral1
Sample
77d1929ff22a0c4d012bd4854f8f184c.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
77d1929ff22a0c4d012bd4854f8f184c.exe
Resource
win10v2004-20231215-en
General
-
Target
77d1929ff22a0c4d012bd4854f8f184c
-
Size
250KB
-
MD5
77d1929ff22a0c4d012bd4854f8f184c
-
SHA1
174e1863bfbd6e1965c5c6b9b36ee1a965fe9762
-
SHA256
dc69f77b4cd67ce93cc2af6b1f9ec5bfe8e69e02b98be2b3ffeed7533f9669d3
-
SHA512
a09f1b4c48d6bec7cfa48c30cc388582783bb4d51b2a4804386b6a7e2ad059b4c97acdfa7c73ead1f61f5b075cdf63ccd8116162159592588b8d7d717355c3dd
-
SSDEEP
6144:2t/AKmmMsIHkARu050+v0E0BBAYBu1/F55EGcW9Pk:ooKmmMpHkAA05SE0BBXuZH5llk
Malware Config
Signatures
Files
-
77d1929ff22a0c4d012bd4854f8f184c.exe windows:4 windows x86 arch:x86
8b8d4415f5ff01a15983fc5e031c14e7
Code Sign
70:ba:e4:1d:10:d9:29:34:b6:38:ca:7b:03:cc:ba:bfCertificate
IssuerOU=Class 3 Public Primary Certification Authority,O=VeriSign\, Inc.,C=USNot Before29/01/1996, 00:00Not After01/08/2028, 23:59SubjectOU=Class 3 Public Primary Certification Authority,O=VeriSign\, Inc.,C=US38:25:d7:fa:f8:61:af:9e:f4:90:e7:26:b5:d6:5a:d5Certificate
IssuerCN=VeriSign Time Stamping Services CA,O=VeriSign\, Inc.,C=USNot Before15/06/2007, 00:00Not After14/06/2012, 23:59SubjectCN=VeriSign Time Stamping Services Signer - G2,O=VeriSign\, Inc.,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
47:bf:19:95:df:8d:52:46:43:f7:db:6d:48:0d:31:a4Certificate
IssuerCN=Thawte Timestamping CA,OU=Thawte Certification,O=Thawte,L=Durbanville,ST=Western Cape,C=ZANot Before04/12/2003, 00:00Not After03/12/2013, 23:59SubjectCN=VeriSign Time Stamping Services CA,O=VeriSign\, Inc.,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
1c:2d:d6:1a:35:e6:5d:f6:29:97:01:ff:9b:e5:ca:44Certificate
IssuerCN=VeriSign Class 3 Code Signing 2009-2 CA,OU=VeriSign Trust Network+OU=Terms of use at https://www.verisign.com/rpa (c)09,O=VeriSign\, Inc.,C=USNot Before20/01/2010, 00:00Not After24/01/2012, 23:59SubjectCN=BITDEFENDER LLC,OU=Digital ID Class 3 - Microsoft Software Validation v2,O=BITDEFENDER LLC,L=Fort Lauderdale,ST=Florida,C=USExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
65:52:26:e1:b2:2e:18:e1:59:0f:29:85:ac:22:e7:5cCertificate
IssuerOU=Class 3 Public Primary Certification Authority,O=VeriSign\, Inc.,C=USNot Before21/05/2009, 00:00Not After20/05/2019, 23:59SubjectCN=VeriSign Class 3 Code Signing 2009-2 CA,OU=VeriSign Trust Network+OU=Terms of use at https://www.verisign.com/rpa (c)09,O=VeriSign\, Inc.,C=USExtended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
04:ce:d0:f1:d0:34:e9:0d:bf:f6:98:f8:44:0c:e9:5d:83:bb:c6:29Signer
Actual PE Digest04:ce:d0:f1:d0:34:e9:0d:bf:f6:98:f8:44:0c:e9:5d:83:bb:c6:29Digest Algorithmsha1PE Digest MatchesfalseHeaders
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CopyFileA
FatalAppExitA
GetDiskFreeSpaceA
lstrcpynW
GetHandleInformation
GetACP
ConnectNamedPipe
ReplaceFileA
FatalAppExitW
SetComputerNameA
SetErrorMode
GetEnvironmentStringsA
SleepEx
CreateSemaphoreA
SearchPathA
lstrlenW
GetCurrentProcess
HeapCreate
VirtualAlloc
GetLastError
GetShortPathNameW
OpenEventA
GetFullPathNameW
GetLocaleInfoW
user32
LoadMenuIndirectW
EnumChildWindows
UnregisterClassW
GetDC
DrawTextW
CreatePopupMenu
DrawIcon
GetClassLongW
GetSysColorBrush
SetWindowPos
InvalidateRect
UnregisterClassA
GetWindowLongW
PostQuitMessage
CreateDialogParamW
wvsprintfA
MonitorFromRect
PeekMessageA
CopyRect
GetWindowRect
FindWindowW
CopyIcon
gdi32
DPtoLP
GdiGetBatchLimit
IntersectClipRect
GetCharWidth32W
GetPath
RestoreDC
GetViewportExtEx
AddFontResourceA
ExtEscape
Escape
EnumICMProfilesW
SetTextAlign
SetStretchBltMode
GetTextAlign
GetAspectRatioFilterEx
GetBoundsRect
advapi32
RegQueryInfoKeyA
RegEnumValueA
ConvertSidToStringSidW
RegOpenKeyA
RegDeleteValueW
RegQueryInfoKeyW
RegEnumValueW
urlmon
HlinkGoBack
inetcomm
EssSecurityLabelEncodeEx
MimeOleGetPropA
MimeEditIsSafeToRun
MimeOleSetBodyPropW
MimeOleSMimeCapRelease
MimeOleSMimeCapsFromDlg
HrGetDisplayNameWithSizeForFile
MimeOleSMimeCapInit
Sections
.e Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.LWJhYO Size: 1024B - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.a Size: 2KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.cItrh Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.fiNbxn Size: 1KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.d Size: 1KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.FbyuK Size: 2KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tNIhR Size: 1KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 592B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.Ca Size: 2KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.S Size: 1KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc1 Size: 212KB - Virtual size: 212KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 796B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ