Static task
static1
Behavioral task
behavioral1
Sample
776f73430f378841aae119da74800e39beb7f05a44151c17a7dd49e7963fb4ef.exe
Resource
win7-20231215-en
General
-
Target
776f73430f378841aae119da74800e39beb7f05a44151c17a7dd49e7963fb4ef
-
Size
4.1MB
-
MD5
a83a5c1d2f4d3e4efa16a17b808a161a
-
SHA1
049bbd76b15b45562a77970e3f18cb4d2b19d5ce
-
SHA256
776f73430f378841aae119da74800e39beb7f05a44151c17a7dd49e7963fb4ef
-
SHA512
20c0ffe77b36c979bebc89ba24222183d79a8850efc1ef245832e62f815fb8df18ff16539eea6fa268c176640861b1a591ea6956010b792c049d5a5000a9136e
-
SSDEEP
98304:aNj8vO2a7S/tJNrCbBbO7xN5I7J1csZNWJOkju9YcgxkM7ejw:mAvODSrdk1kN+7sI6OFYczM7L
Malware Config
Signatures
Files
-
776f73430f378841aae119da74800e39beb7f05a44151c17a7dd49e7963fb4ef.exe windows:5 windows x86 arch:x86
b270ac0e67aad6305196ef71a1db1fb1
Code Sign
e2:be:53:de:53:de:f4:de:2a:4c:c3:cf:f5:e0:66:73Certificate
IssuerCN=522b0300053323224d0036132e0352222e2216260b17250f343c151c22001a3b0d00,POSTALCODE=10820,ST=0b1c1115005f5c4e130a09061b01101e15030d1400004d071702+ST=0b1c1115494a5c0a405601000f17134502120d431112025a0d5102560055050452040c11020709125303081f0a5b1f1d400c1808040a15195a101d060a1a055b0c0b0a070bNot Before23/01/2024, 16:41Not After22/01/2025, 16:41SubjectCN=522b0300053323224d0036132e0352222e2216260b17250f343c151c22001a3b0d00,POSTALCODE=10820,ST=0b1c1115005f5c4e130a09061b01101e15030d1400004d071702+ST=0b1c1115494a5c0a405601000f17134502120d431112025a0d5102560055050452040c11020709125303081f0a5b1f1d400c1808040a15195a101d060a1a055b0c0b0a070b42:4e:1a:33:dc:7c:ea:bf:11:cb:20:fd:6c:c2:51:81:e8:2b:7e:6c:8d:0b:71:34:7e:88:33:33:0c:99:0b:c4Signer
Actual PE Digest42:4e:1a:33:dc:7c:ea:bf:11:cb:20:fd:6c:c2:51:81:e8:2b:7e:6c:8d:0b:71:34:7e:88:33:33:0c:99:0b:c4Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
UnregisterWait
GetStringTypeA
FindResourceW
HeapAlloc
MoveFileExW
OpenJobObjectA
InterlockedDecrement
SetTapeParameters
GetTickCount
GetConsoleAliasesA
TzSpecificLocalTimeToSystemTime
LoadLibraryW
GetLocaleInfoW
IsProcessorFeaturePresent
GetAtomNameW
ReadFile
GetEnvironmentVariableA
CompareStringW
SetConsoleTitleA
RaiseException
GetLastError
GetProcAddress
SetComputerNameA
LoadLibraryA
LocalAlloc
WritePrivateProfileStringA
SetCurrentDirectoryW
CancelIo
FreeEnvironmentStringsW
ReleaseMutex
EndUpdateResourceA
EnumCalendarInfoExA
LocalFree
SetFileAttributesW
GetCommandLineW
HeapSetInformation
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleHandleW
ExitProcess
DecodePointer
WriteFile
GetStdHandle
GetModuleFileNameW
HeapCreate
HeapDestroy
EncodePointer
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
GetCurrentThread
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
FatalAppExitA
EnterCriticalSection
SetConsoleCtrlHandler
FreeLibrary
InterlockedExchange
HeapFree
Sleep
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
RtlUnwind
WideCharToMultiByte
HeapSize
HeapReAlloc
LCMapStringW
MultiByteToWideChar
GetStringTypeW
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
Sections
.text Size: 4.0MB - Virtual size: 4.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 68KB - Virtual size: 5.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ