Static task
static1
Behavioral task
behavioral1
Sample
404a62c275422d072752f5f6e49084665dafa3edfbdb4d174e366a6f4e2e549b.exe
Resource
win7-20231129-en
General
-
Target
404a62c275422d072752f5f6e49084665dafa3edfbdb4d174e366a6f4e2e549b
-
Size
4.2MB
-
MD5
525f41923001a64e2a47bb8893ceaa95
-
SHA1
49994af3fbabea695693d80768e5ec030abb9f2b
-
SHA256
404a62c275422d072752f5f6e49084665dafa3edfbdb4d174e366a6f4e2e549b
-
SHA512
bb5c82726f57dd3a76b681f5dd810589f840ed385c76e9ec784b589dfbc5a5cebc382654b58d04bdc7f3d832e274dfaad68da45879c02eae1c63a46c539bd3d7
-
SSDEEP
98304:vdGlegyN++D+DeE7kux9zCVxOCBg2dhzE7EAcfmxl/Z2mknz:Qle/++YeEHxozTCCYwhfmxKj
Malware Config
Signatures
Files
-
404a62c275422d072752f5f6e49084665dafa3edfbdb4d174e366a6f4e2e549b.exe windows:5 windows x86 arch:x86
b499ecd51f921377740ef2835f6980a0
Code Sign
72:21:a2:50:38:0b:66:93:3b:1e:37:46:b9:f0:3b:86Certificate
IssuerCN=522434573635311625120101053d123d53210e113336571014061e5d361525000421,POSTALCODE=10820,ST=0b1c1115005f5c4e11160813180402164b1c1312+ST=0b1c1115494a5c111413080004511740571216140506085f501c465147571b51505119141402511b5716571c511b0904121c030e061111050a0600110102055b0c0b0a070bNot Before30-11-2023 17:20Not After29-11-2024 17:20SubjectCN=522434573635311625120101053d123d53210e113336571014061e5d361525000421,POSTALCODE=10820,ST=0b1c1115005f5c4e11160813180402164b1c1312+ST=0b1c1115494a5c111413080004511740571216140506085f501c465147571b51505119141402511b5716571c511b0904121c030e061111050a0600110102055b0c0b0a070b57:fe:98:ec:ca:5e:50:00:5e:c6:f6:4f:59:d5:27:5a:d1:c5:df:70:13:c9:42:91:11:97:51:b6:e4:18:51:38Signer
Actual PE Digest57:fe:98:ec:ca:5e:50:00:5e:c6:f6:4f:59:d5:27:5a:d1:c5:df:70:13:c9:42:91:11:97:51:b6:e4:18:51:38Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\tafic_ko.pdb
Imports
kernel32
LoadResource
EndUpdateResourceW
GetCurrentProcess
CreateJobObjectW
InterlockedCompareExchange
SignalObjectAndWait
SetComputerNameW
GetComputerNameW
GetModuleHandleW
GetTickCount
EnumTimeFormatsA
GetDateFormatA
TzSpecificLocalTimeToSystemTime
GlobalAlloc
SetFileShortNameW
GlobalFindAtomA
FormatMessageW
GetVersionExW
SetConsoleCursorPosition
GetVolumePathNameA
LCMapStringA
GetConsoleAliasesW
OpenMutexW
GetLastError
SetLastError
BackupRead
GetConsoleAliasExesLengthA
CreateFileA
VirtualAlloc
EnumDateFormatsExA
HeapUnlock
SetComputerNameA
LoadLibraryA
InterlockedExchangeAdd
CreateFileMappingA
DeleteTimerQueue
CreateFileMappingW
FindFirstVolumeMountPointW
SetThreadIdealProcessor
FoldStringW
FindFirstVolumeMountPointA
VirtualProtect
CompareStringA
GetCurrentThreadId
OpenSemaphoreW
TerminateJobObject
GetWindowsDirectoryW
GlobalAddAtomW
TlsGetValue
ReadConsoleOutputCharacterA
GetNativeSystemInfo
GetFullPathNameA
GetProcAddress
UnhandledExceptionFilter
SetUnhandledExceptionFilter
Sleep
ExitProcess
GetCommandLineA
GetStartupInfoA
WriteFile
GetStdHandle
GetModuleFileNameA
RaiseException
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
InterlockedDecrement
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
TerminateProcess
IsDebuggerPresent
InitializeCriticalSectionAndSpinCount
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapCreate
VirtualFree
HeapFree
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetModuleHandleA
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
RtlUnwind
HeapSize
GetLocaleInfoA
HeapAlloc
HeapReAlloc
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
user32
CharUpperW
DdeQueryStringA
SetMessageExtraInfo
gdi32
CreateCompatibleBitmap
SetDeviceGammaRamp
advapi32
SetKernelObjectSecurity
ole32
StringFromIID
Sections
.text Size: 4.0MB - Virtual size: 4.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 38.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 130KB - Virtual size: 130KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ