Static task
static1
Behavioral task
behavioral1
Sample
57c1424b08b502eeef5ef902e08397c7a37f0248cc1b4f1043db820ab77ac54f.exe
Resource
win7-20240221-en
General
-
Target
57c1424b08b502eeef5ef902e08397c7a37f0248cc1b4f1043db820ab77ac54f
-
Size
4.1MB
-
MD5
374a90da1a6547f00f47d1cb5bce6297
-
SHA1
b38a83b09e4931ff7089b497f2b3676ab537faf8
-
SHA256
57c1424b08b502eeef5ef902e08397c7a37f0248cc1b4f1043db820ab77ac54f
-
SHA512
07cb2eb4f98cdf5e09db509186a5b7b18975c4ef000ce7247711bb35f5fc536f70d05420992312926c860123af017a7b2e341a99d74ca1eadfd11397f4ac7705
-
SSDEEP
98304:aZy2mpndnSc8onitd+7GuclR/Kx46q1BnU79m/Ri5HAy0QODik2gj+BW3RLqT:Uy5TnKon/Tcu46aBU79mUaxQODik2PBf
Malware Config
Signatures
Files
-
57c1424b08b502eeef5ef902e08397c7a37f0248cc1b4f1043db820ab77ac54f.exe windows:5 windows x86 arch:x86
0c3f2cf9e47c10e842f2d44e413c1a98
Code Sign
94:43:ad:8f:63:c7:be:4e:b2:ff:a3:1c:7f:74:40:37Certificate
IssuerCN=522434573635311625120101053d123d53210e113336571014061e5d361525000421,POSTALCODE=10700,ST=0b1c1115005f5c4e11160813180402164b1c1312+ST=0b1c1115494a5c111413080004511740571216140506085f501c465147571b51505119141402511b5716571c511b0904121c030e061111050a0600110102055b0c0b0a070bNot Before05/03/2024, 17:00Not After05/03/2025, 17:00SubjectCN=522434573635311625120101053d123d53210e113336571014061e5d361525000421,POSTALCODE=10700,ST=0b1c1115005f5c4e11160813180402164b1c1312+ST=0b1c1115494a5c111413080004511740571216140506085f501c465147571b51505119141402511b5716571c511b0904121c030e061111050a0600110102055b0c0b0a070b3d:d4:46:ef:c1:ac:ea:a5:19:a3:eb:cc:34:4f:c4:0e:c5:70:85:a6:f7:9d:9c:72:56:18:8a:24:3e:b3:68:60Signer
Actual PE Digest3d:d4:46:ef:c1:ac:ea:a5:19:a3:eb:cc:34:4f:c4:0e:c5:70:85:a6:f7:9d:9c:72:56:18:8a:24:3e:b3:68:60Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\natijip\degabemek.pdb
Imports
kernel32
GetConsoleAliasExesLengthA
InterlockedIncrement
ReadConsoleA
InterlockedDecrement
AddConsoleAliasW
GetFileAttributesExA
GetTickCount
FindNextVolumeMountPointA
GetNumberFormatA
GetWindowsDirectoryA
EnumTimeFormatsA
GlobalAlloc
GetLocaleInfoW
ReadConsoleInputA
GetThreadSelectorEntry
GetVersionExW
CreateDirectoryA
GetLastError
GetProcAddress
GetLocaleInfoA
RemoveDirectoryA
LoadLibraryA
WriteConsoleA
GlobalFindAtomW
SetEnvironmentVariableA
GetModuleFileNameA
GetConsoleTitleW
GetCurrentDirectoryA
DuplicateHandle
GetCurrentProcessId
GetVolumeInformationW
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
CreateFileA
FindResourceA
VirtualAlloc
GetComputerNameA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
GetStartupInfoA
HeapAlloc
HeapFree
RaiseException
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
GetFileType
DeleteCriticalSection
WriteFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
FlushFileBuffers
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
Sleep
ExitProcess
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
VirtualFree
QueryPerformanceCounter
GetSystemTimeAsFileTime
HeapReAlloc
GetModuleHandleA
SetFilePointer
InitializeCriticalSectionAndSpinCount
RtlUnwind
GetConsoleOutputCP
WriteConsoleW
MultiByteToWideChar
SetStdHandle
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapSize
CloseHandle
user32
CharLowerBuffA
CharUpperBuffW
LoadKeyboardLayoutW
GetAltTabInfoA
UnregisterClassA
gdi32
StretchDIBits
advapi32
ReadEventLogA
shell32
FindExecutableW
winhttp
WinHttpCheckPlatform
Sections
.text Size: 4.0MB - Virtual size: 4.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 76KB - Virtual size: 22.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ