Static task
static1
Behavioral task
behavioral1
Sample
318226bbb7cd02f1e553b050012d27a394754ed7f4557764c5041d3806975399.exe
Resource
win7-20231215-en
General
-
Target
318226bbb7cd02f1e553b050012d27a394754ed7f4557764c5041d3806975399
-
Size
4.1MB
-
MD5
53db92f9cfa5f268a058a0aea6f4c023
-
SHA1
90502054f676bd740fa08d8174069f7ffc6e0d66
-
SHA256
318226bbb7cd02f1e553b050012d27a394754ed7f4557764c5041d3806975399
-
SHA512
8b827739fdaa95a94916d9d35df67f4303bd8f52d52bf2a6cffbb1298fe71679e7a9f2d795c89116065b8c59ae8dc54ec2d309598eaea3976e147b0677647871
-
SSDEEP
98304:D4FISRnT5dKQ8VwqAMya5oPzG2g2e1x5FO4NmCNt+:sGc2wPMyxm1o4NmCu
Malware Config
Signatures
Files
-
318226bbb7cd02f1e553b050012d27a394754ed7f4557764c5041d3806975399.exe windows:5 windows x86 arch:x86
0434967da91307b41bbd56e96ff6e491
Code Sign
b9:d3:1b:c3:ee:7a:22:6f:aa:c0:00:67:90:3d:a4:52Certificate
IssuerCN=522a29533d3f200e2d1728300c141021081631313626321023042b113f2d26353224,POSTALCODE=10820,ST=0b1c1115005f5c4e140f09101c0411000c1d4f0716+ST=0b1c1115494a5c17161151151d135100034653465007170e1c520b071c040f0f5216050f1244171f0b110e04061211081e0347124308570a1e0c0b19560a055b0c0b0a070bNot Before24/01/2024, 16:48Not After23/01/2025, 16:48SubjectCN=522a29533d3f200e2d1728300c141021081631313626321023042b113f2d26353224,POSTALCODE=10820,ST=0b1c1115005f5c4e140f09101c0411000c1d4f0716+ST=0b1c1115494a5c17161151151d135100034653465007170e1c520b071c040f0f5216050f1244171f0b110e04061211081e0347124308570a1e0c0b19560a055b0c0b0a070b33:a2:58:56:e9:15:98:8f:01:91:19:54:a8:9e:ff:98:02:16:b0:ea:02:94:2b:52:b7:e2:81:b0:cd:a0:ce:15Signer
Actual PE Digest33:a2:58:56:e9:15:98:8f:01:91:19:54:a8:9e:ff:98:02:16:b0:ea:02:94:2b:52:b7:e2:81:b0:cd:a0:ce:15Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\bahixu-73.pdb
Imports
kernel32
QueryDosDeviceA
AddConsoleAliasW
GetFileAttributesExA
MoveFileWithProgressA
GetModuleHandleW
GetTickCount
WriteConsoleW
SetComputerNameExW
CreateJobObjectA
GetStartupInfoA
GetLastError
SetLastError
GetProcAddress
AttachConsole
VirtualAlloc
InterlockedDecrement
MoveFileW
RemoveDirectoryA
LoadLibraryA
LocalAlloc
FindFirstVolumeMountPointW
FindNextChangeNotification
GlobalFindAtomW
GetModuleFileNameA
GetStringTypeW
VirtualProtect
PurgeComm
WriteConsoleOutputAttribute
DeleteFileW
GetCurrentProcessId
DebugBreak
SetVolumeLabelW
GetSystemDefaultLangID
MultiByteToWideChar
Sleep
ExitProcess
GetStartupInfoW
GetCPInfo
InterlockedIncrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
HeapFree
WriteFile
GetStdHandle
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
HeapCreate
VirtualFree
QueryPerformanceCounter
GetSystemTimeAsFileTime
LCMapStringA
WideCharToMultiByte
LCMapStringW
GetStringTypeA
GetLocaleInfoA
GetModuleHandleA
HeapAlloc
HeapReAlloc
HeapSize
RtlUnwind
advapi32
SetKernelObjectSecurity
Sections
.text Size: 4.0MB - Virtual size: 4.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 19KB - Virtual size: 38.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 79KB - Virtual size: 78KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ