Static task
static1
Behavioral task
behavioral1
Sample
687035b00183370131f9e38a298b099f2e37bcd5babb2d65589926765277e4ff.exe
Resource
win7-20231215-en
General
-
Target
687035b00183370131f9e38a298b099f2e37bcd5babb2d65589926765277e4ff
-
Size
4.1MB
-
MD5
68000efae1a1a321d59a2f83c7849102
-
SHA1
3d4f5ec20b6d89f7b48a6a064b64adf7299b3360
-
SHA256
687035b00183370131f9e38a298b099f2e37bcd5babb2d65589926765277e4ff
-
SHA512
2e3ec475a41e55f4b66076a5782b746eae24ed1d703c45ee09a17c2dc70c86a64972add60273ef97bdfd35bf37b668fd153252103cbe57de2804a2a1c100c23a
-
SSDEEP
98304:XfoZjwaqLS9kJMOnAKemjlsux99jgxBERa1fbjFmM+dfPa:XQjwJpM4AK9sunxgxag1fbvr
Malware Config
Signatures
Files
-
687035b00183370131f9e38a298b099f2e37bcd5babb2d65589926765277e4ff.exe windows:5 windows x86 arch:x86
e368dc091dc26b6066442b735ec875e5
Code Sign
40:33:cc:94:8b:bd:1d:4e:7d:65:5c:12:a0:1d:75:b0Certificate
IssuerCN=52263d520931235736570a2402571c4021122b211102515e242235323619033a0b11,POSTALCODE=10820,ST=0b1c1115005f5c4e061704171b111712031508164d0a110f+ST=0b1c1115494a5c5305080e17100e0340021d1116090d510a0d0c455712130f510c06110f020b0a100346090b065b0e06410b06530c151c1b191457400b12055b0c0b0a070bNot Before22/01/2024, 16:46Not After21/01/2025, 16:46SubjectCN=52263d520931235736570a2402571c4021122b211102515e242235323619033a0b11,POSTALCODE=10820,ST=0b1c1115005f5c4e061704171b111712031508164d0a110f+ST=0b1c1115494a5c5305080e17100e0340021d1116090d510a0d0c455712130f510c06110f020b0a100346090b065b0e06410b06530c151c1b191457400b12055b0c0b0a070b38:4c:a4:30:be:8a:a4:7f:b9:0e:a4:70:47:c4:c8:6e:3c:3b:dd:91:59:c4:a6:ee:2d:52:fc:3b:9f:6c:f4:0fSigner
Actual PE Digest38:4c:a4:30:be:8a:a4:7f:b9:0e:a4:70:47:c4:c8:6e:3c:3b:dd:91:59:c4:a6:ee:2d:52:fc:3b:9f:6c:f4:0fDigest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\mahipilip.pdb
Imports
kernel32
GetSystemDefaultLangID
InterlockedDecrement
QueryDosDeviceA
MoveFileWithProgressA
GetModuleHandleW
GetTickCount
VirtualFree
GetConsoleAliasesLengthA
FreeConsole
GetModuleFileNameW
SetComputerNameExW
GetStartupInfoW
CreateJobObjectA
GetLastError
SetLastError
ReadConsoleOutputCharacterA
GetProcAddress
VirtualAlloc
SetVolumeLabelW
LoadLibraryA
WriteConsoleA
InterlockedExchangeAdd
LocalAlloc
MoveFileA
FindFirstVolumeMountPointW
RemoveDirectoryW
FindNextChangeNotification
GlobalFindAtomW
GetStringTypeW
PurgeComm
GetFileAttributesExW
WaitForDebugEvent
WriteConsoleOutputAttribute
SetCalendarInfoA
GetCurrentProcessId
DeleteFileA
MultiByteToWideChar
Sleep
ExitProcess
GetCPInfo
InterlockedIncrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
CloseHandle
EnterCriticalSection
LeaveCriticalSection
RaiseException
WriteFile
GetStdHandle
GetModuleFileNameA
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
HeapCreate
QueryPerformanceCounter
GetSystemTimeAsFileTime
LCMapStringA
WideCharToMultiByte
LCMapStringW
GetStringTypeA
GetLocaleInfoA
HeapAlloc
HeapReAlloc
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
RtlUnwind
GetModuleHandleA
HeapSize
GetConsoleOutputCP
WriteConsoleW
SetFilePointer
CreateFileA
Sections
.text Size: 4.0MB - Virtual size: 4.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 4.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 80KB - Virtual size: 952KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ