Static task
static1
Behavioral task
behavioral1
Sample
6667e1ab4f79b6ed3869ccfa9cce86551d54cbfa4661a2350eee40e6a7a8faf5.exe
Resource
win7-20240221-en
General
-
Target
6667e1ab4f79b6ed3869ccfa9cce86551d54cbfa4661a2350eee40e6a7a8faf5.exe
-
Size
4.1MB
-
MD5
79d4dff9174adc484693a231b3bd7af2
-
SHA1
63d80f54a2b560ef4227d6aca4934ae606f8b4a8
-
SHA256
6667e1ab4f79b6ed3869ccfa9cce86551d54cbfa4661a2350eee40e6a7a8faf5
-
SHA512
238935b8caf940db2045ff8adfedbbea5e3196a5544e297923e0f983ec69bc40242ce042038422da4ad961774e7f1f135f67022dbb1236bfd5b1a3a4a5a5d17a
-
SSDEEP
98304:xMzAMLpWeVBMfi1O79l3dk/dJxFamkHdK:xMzA2W8BMCq9RuxFAHY
Malware Config
Signatures
Files
-
6667e1ab4f79b6ed3869ccfa9cce86551d54cbfa4661a2350eee40e6a7a8faf5.exe.exe windows:5 windows x86 arch:x86
095ad42ae522f1afa7e24afbb4c74732
Code Sign
b1:53:9c:e9:f7:7a:2e:45:ed:8f:d8:e9:7e:9c:86:84Certificate
IssuerCN=525d0b323423120e110456060e332e32311412140236333d57310b361108382b0633,POSTALCODE=10820,ST=0b1c1115005f5c4e181a03021b111003011215104d0a110f+ST=0b1c1115494a5c0c14061615180a130112020714120f145c5107110011530255570b5e0b52161c1c1217060c175f1703011717030c091c0e19041d15170a055b0c0b0a070bNot Before25-02-2024 09:44Not After24-02-2025 09:44SubjectCN=525d0b323423120e110456060e332e32311412140236333d57310b361108382b0633,POSTALCODE=10820,ST=0b1c1115005f5c4e181a03021b111003011215104d0a110f+ST=0b1c1115494a5c0c14061615180a130112020714120f145c5107110011530255570b5e0b52161c1c1217060c175f1703011717030c091c0e19041d15170a055b0c0b0a070b16:96:16:3e:ab:ca:1d:b6:f9:11:15:e1:5e:84:e6:36:bb:59:18:a2:ec:c5:d9:66:06:3d:eb:fd:e6:1d:f6:c7Signer
Actual PE Digest16:96:16:3e:ab:ca:1d:b6:f9:11:15:e1:5e:84:e6:36:bb:59:18:a2:ec:c5:d9:66:06:3d:eb:fd:e6:1d:f6:c7Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\fisixawax96\fadunipiyiliho\suyopo14\xirahoririduni.pdb
Imports
kernel32
InterlockedIncrement
ReadConsoleA
GetConsoleAliasA
QueryDosDeviceA
SetComputerNameW
GetComputerNameW
CreateDirectoryExA
GetFileAttributesExA
GetModuleHandleW
GetTickCount
FindNextVolumeMountPointA
GetConsoleTitleA
ReadConsoleW
GetConsoleAliasExesW
GetDriveTypeA
GetVolumePathNameW
GlobalAlloc
GlobalFindAtomA
LoadLibraryW
GetLocaleInfoW
ReadConsoleInputA
GetConsoleAliasExesLengthW
GetLastError
SetLastError
GetProcAddress
VirtualAlloc
RemoveDirectoryA
SetStdHandle
FreeUserPhysicalPages
GetTempFileNameA
LoadLibraryA
InterlockedExchangeAdd
GetNumberFormatW
DeviceIoControl
QueryMemoryResourceNotification
GetCurrentProcessId
AddConsoleAliasA
GetVolumeInformationW
CloseHandle
GetCommandLineA
GetStartupInfoA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
HeapFree
SetHandleCount
GetStdHandle
GetFileType
DeleteCriticalSection
SetFilePointer
EnterCriticalSection
LeaveCriticalSection
Sleep
ExitProcess
WriteFile
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
InterlockedDecrement
HeapCreate
VirtualFree
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetModuleHandleA
RaiseException
HeapReAlloc
InitializeCriticalSectionAndSpinCount
RtlUnwind
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
FlushFileBuffers
HeapSize
CreateFileA
user32
CharUpperBuffA
LoadKeyboardLayoutA
RealGetWindowClassA
Sections
.text Size: 4.0MB - Virtual size: 4.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 40KB - Virtual size: 41.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 38KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ