Static task
static1
Behavioral task
behavioral1
Sample
e661c7cf61e81f402a30140c982969990ae674c0a2933f459f0794d12a8848c7.exe
Resource
win7-20231129-en
General
-
Target
e661c7cf61e81f402a30140c982969990ae674c0a2933f459f0794d12a8848c7
-
Size
4.1MB
-
MD5
a9b0df5233ca0026dee897f746dc3015
-
SHA1
f843656f1cd69d9763b4663916d5a332deae6132
-
SHA256
e661c7cf61e81f402a30140c982969990ae674c0a2933f459f0794d12a8848c7
-
SHA512
9936971ff959b98d65263ab4f0e8588112ff7e86c8b83408e1ed373937b69661b6020e830277a044906a4233e7345f6136f8e4a73dfc66ddebc7ae71d4a1e02e
-
SSDEEP
98304:taGBG0NktAON/W5xaxaHtgJPvKFTTRitwcaKgtbVsdkG:Ft+yjTHtgJGaZb6sCG
Malware Config
Signatures
Files
-
e661c7cf61e81f402a30140c982969990ae674c0a2933f459f0794d12a8848c7.exe windows:5 windows x86 arch:x86
b9bed65464be6d89814eac251ed4ea2e
Code Sign
37:51:c3:09:07:4e:d1:1d:a7:bd:8b:81:c0:b4:98:0fCertificate
IssuerCN=522036264b3c07530c0910253d36220330152b1b14292e1a512d092b0b3746071333,POSTALCODE=10820,ST=0b1c1115005f5c4e010b00161801040700070818064b0c1a02+ST=0b1c1115494a5c031c0b02081a1750475310151f070b57051217441d47031d1512195d501615110b570d0a17550b1209150a45131d1315075a001044160a055b0c0b0a070bNot Before23/01/2024, 00:53Not After22/01/2025, 00:53SubjectCN=522036264b3c07530c0910253d36220330152b1b14292e1a512d092b0b3746071333,POSTALCODE=10820,ST=0b1c1115005f5c4e010b00161801040700070818064b0c1a02+ST=0b1c1115494a5c031c0b02081a1750475310151f070b57051217441d47031d1512195d501615110b570d0a17550b1209150a45131d1315075a001044160a055b0c0b0a070bdc:67:2c:8e:fa:0a:4b:43:ec:ec:a4:6a:42:f0:4d:06:a2:dd:b0:22:4b:5f:3e:58:8f:d3:24:32:04:e5:c3:05Signer
Actual PE Digestdc:67:2c:8e:fa:0a:4b:43:ec:ec:a4:6a:42:f0:4d:06:a2:dd:b0:22:4b:5f:3e:58:8f:d3:24:32:04:e5:c3:05Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\cadumacusamo\kogu_ciwetocapoj vicol\jinotiyetud9 visizevet.pdb
Imports
kernel32
GetSystemDefaultLangID
InterlockedDecrement
QueryDosDeviceA
InterlockedCompareExchange
MoveFileWithProgressA
GetModuleHandleW
GetTickCount
VirtualFree
GetConsoleAliasesLengthA
FreeConsole
SetComputerNameExW
GetStartupInfoW
CreateJobObjectA
GetLastError
SetLastError
GetProcAddress
AttachConsole
VirtualAlloc
SetVolumeLabelW
RemoveDirectoryA
LoadLibraryA
WriteConsoleA
LocalAlloc
MoveFileA
FindFirstVolumeMountPointW
FindNextChangeNotification
GlobalFindAtomW
GetModuleFileNameA
GetStringTypeW
PurgeComm
GetFileAttributesExW
WaitForDebugEvent
WriteConsoleOutputAttribute
SetCalendarInfoA
GetCurrentProcessId
ReadConsoleOutputCharacterW
DeleteFileA
MultiByteToWideChar
Sleep
ExitProcess
GetCPInfo
InterlockedIncrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
RaiseException
WriteFile
GetStdHandle
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
HeapCreate
QueryPerformanceCounter
GetSystemTimeAsFileTime
LCMapStringA
WideCharToMultiByte
LCMapStringW
GetStringTypeA
GetLocaleInfoA
HeapAlloc
HeapReAlloc
GetModuleHandleA
HeapSize
RtlUnwind
Sections
.text Size: 4.0MB - Virtual size: 4.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 19KB - Virtual size: 4.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 79KB - Virtual size: 962KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ