Static task
static1
Behavioral task
behavioral1
Sample
03c0c323151fafabf669664747be968a3e5bd01ff94f7c7d4777880a9aec4e7c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
03c0c323151fafabf669664747be968a3e5bd01ff94f7c7d4777880a9aec4e7c.exe
Resource
win10v2004-20240226-en
General
-
Target
03c0c323151fafabf669664747be968a3e5bd01ff94f7c7d4777880a9aec4e7c
-
Size
639KB
-
MD5
d28170bf546007791d8d45f37ba18a87
-
SHA1
8a36993f3d3afb73bd65f23abf6a7a7f10aaf0c2
-
SHA256
03c0c323151fafabf669664747be968a3e5bd01ff94f7c7d4777880a9aec4e7c
-
SHA512
53059c83c5500f534ab09bee9fcc26eaa5201a3344dbef3604859c57e90b92b326bda3d5207e397c7fb275abbc4fe4dd9559c8cc557fd0be8b5d19ffc899f460
-
SSDEEP
12288:qxek7QXWPd9EONf6vwmkgEVMC3DKKCeLE3:8R9ddZXmkxb3DZJK
Malware Config
Signatures
Files
-
03c0c323151fafabf669664747be968a3e5bd01ff94f7c7d4777880a9aec4e7c.exe windows:6 windows x64 arch:x64
b8da6c2220cf7a5e11a2f2ee9055b1e2
Code Sign
07:e6:fa:35:48:11:8e:00:9f:3e:b3:68:a3:8e:58:e9:34:eb:14:23Certificate
IssuerCN=yuanzijiasu,OU=yuanzijiasu,O=yuanzijiasu,L=yuanzijiasu,ST=yuanzijiasu,C=yu,1.2.840.113549.1.9.1=#130f7975616e7a696a696173752e636f6dNot Before12/11/2023, 09:03Not After11/11/2024, 09:03SubjectCN=yuanzijiasu,OU=yuanzijiasu,O=yuanzijiasu,L=yuanzijiasu,ST=yuanzijiasu,C=yu,1.2.840.113549.1.9.1=#130f7975616e7a696a696173752e636f6d0e:9b:18:8e:f9:d0:2d:e7:ef:db:50:e2:08:40:18:5aCertificate
IssuerCN=DigiCert Assured ID Root CA,OU=www.digicert.com,O=DigiCert Inc,C=USNot Before01/08/2022, 00:00Not After09/11/2031, 23:59SubjectCN=DigiCert Trusted Root G4,OU=www.digicert.com,O=DigiCert Inc,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
07:36:37:b7:24:54:7c:d8:47:ac:fd:28:66:2a:5e:5bCertificate
IssuerCN=DigiCert Trusted Root G4,OU=www.digicert.com,O=DigiCert Inc,C=USNot Before23/03/2022, 00:00Not After22/03/2037, 23:59SubjectCN=DigiCert Trusted G4 RSA4096 SHA256 TimeStamping CA,O=DigiCert\, Inc.,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
05:44:af:f3:94:9d:08:39:a6:bf:db:3f:5f:e5:61:16Certificate
IssuerCN=DigiCert Trusted G4 RSA4096 SHA256 TimeStamping CA,O=DigiCert\, Inc.,C=USNot Before14/07/2023, 00:00Not After13/10/2034, 23:59SubjectCN=DigiCert Timestamp 2023,O=DigiCert\, Inc.,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
f8:31:47:ef:f1:b5:1f:b1:47:e8:80:c7:95:ea:2c:43:45:a2:e3:54:fe:10:24:45:73:f4:88:3a:a4:7b:23:03Signer
Actual PE Digestf8:31:47:ef:f1:b5:1f:b1:47:e8:80:c7:95:ea:2c:43:45:a2:e3:54:fe:10:24:45:73:f4:88:3a:a4:7b:23:03Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
LoadResource
FindResourceW
CreateDirectoryW
ReadFile
WriteFile
SetFileTime
SetFilePointer
CreateFileW
LockResource
MultiByteToWideChar
LocalFileTimeToFileTime
CloseHandle
GetCurrentDirectoryW
SystemTimeToFileTime
SleepConditionVariableSRW
WakeAllConditionVariable
AcquireSRWLockExclusive
ReleaseSRWLockExclusive
DeleteFileW
SizeofResource
GetLastError
GetModuleHandleW
SetCurrentDirectoryW
GetFileAttributesW
WideCharToMultiByte
WriteConsoleW
HeapSize
ReadConsoleW
GetProcessHeap
SetStdHandle
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
HeapReAlloc
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
SetFilePointerEx
GetStringTypeW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
EncodePointer
DecodePointer
LocalFree
LCMapStringEx
GetCPInfo
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
WaitForSingleObject
Sleep
GetTickCount64
LocalAlloc
FormatMessageW
RtlUnwindEx
RtlPcToFileHeader
RaiseException
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
ExitProcess
GetModuleHandleExW
CreateThread
ExitThread
ResumeThread
FreeLibraryAndExitThread
GetStdHandle
GetModuleFileNameW
GetCommandLineA
GetCommandLineW
HeapFree
HeapAlloc
GetFileType
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetFileAttributesExW
GetFileSizeEx
RtlUnwind
user32
RegisterClassExW
ShowWindow
DispatchMessageW
TranslateMessage
LoadIconW
PostQuitMessage
GetWindowLongPtrW
wsprintfW
SendMessageW
GetMessageW
UpdateWindow
SetWindowLongPtrW
ReleaseDC
GetDC
EnableWindow
SetCursor
LoadCursorW
SetWindowPos
GetWindowRect
PostMessageW
GetCursorPos
ScreenToClient
SetWindowsHookExW
UnhookWindowsHookEx
GetWindowThreadProcessId
GetClientRect
MessageBoxW
CreateWindowExW
GetSystemMetrics
DefWindowProcW
shell32
Shell_NotifyIconW
SHGetMalloc
SHGetFolderPathW
SHBrowseForFolderW
SHGetPathFromIDListW
SHGetSpecialFolderPathW
ShellExecuteW
ole32
CoInitialize
CoInitializeEx
CoCreateInstance
CoUninitialize
urlmon
URLDownloadToFileW
wininet
DeleteUrlCacheEntryW
gdi32
GetDeviceCaps
d2d1
ord1
dwrite
DWriteCreateFactory
imm32
ImmSetCompositionWindow
ImmGetContext
Sections
.text Size: 217KB - Virtual size: 216KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 112KB - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 500B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 281KB - Virtual size: 281KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ