Static task
static1
Behavioral task
behavioral1
Sample
b8026ef6b1b15b103cfb0afcdd5d6d77.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b8026ef6b1b15b103cfb0afcdd5d6d77.exe
Resource
win10v2004-20240226-en
General
-
Target
b8026ef6b1b15b103cfb0afcdd5d6d77
-
Size
75KB
-
MD5
b8026ef6b1b15b103cfb0afcdd5d6d77
-
SHA1
21f07e7798f8e3dd4d7bb8f42bf63855ca268535
-
SHA256
baa0bffd149b091bc88d6dbed94ca403dc013c2a2fe231f4e0be672dd4c592eb
-
SHA512
e2ff4e3a9492634420796b8f58a70d61d11edfdc5602ece9ab133d9f3de3e01b4af9fe45cc916b44f95853779683d80ea2aa6d108234a6b8fa7509ae01967ca9
-
SSDEEP
1536:Jath4vYgAROEIUaT34azamAfSHtJpbbtow0YtIxE:Jath4vppEIUaT3JOVfmjpbbtow5tqE
Malware Config
Signatures
Files
-
b8026ef6b1b15b103cfb0afcdd5d6d77.exe windows:4 windows x86 arch:x86
c7a299974f7c5552c5ecb11935c13614
Code Sign
4b:3e:90:08:63:82:47:55:b9:4d:c1:f8:f7:13:1c:c8Certificate
IssuerCN=Thawte Code Signing CANot Before19/08/2010, 08:08Not After31/12/2039, 23:59SubjectCN=Qizhi Software (beijing) Co. Ltd38:25:d7:fa:f8:61:af:9e:f4:90:e7:26:b5:d6:5a:d5Certificate
IssuerCN=VeriSign Time Stamping Services CA,O=VeriSign\, Inc.,C=USNot Before15/06/2007, 00:00Not After14/06/2012, 23:59SubjectCN=VeriSign Time Stamping Services Signer - G2,O=VeriSign\, Inc.,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
47:bf:19:95:df:8d:52:46:43:f7:db:6d:48:0d:31:a4Certificate
IssuerCN=Thawte Timestamping CA,OU=Thawte Certification,O=Thawte,L=Durbanville,ST=Western Cape,C=ZANot Before04/12/2003, 00:00Not After03/12/2013, 23:59SubjectCN=VeriSign Time Stamping Services CA,O=VeriSign\, Inc.,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
6c:f7:f4:df:c4:db:e2:db:29:8a:7e:f7:19:fa:fd:7d:89:b0:cc:5cSigner
Actual PE Digest6c:f7:f4:df:c4:db:e2:db:29:8a:7e:f7:19:fa:fd:7d:89:b0:cc:5cDigest Algorithmsha1PE Digest MatchesfalseHeaders
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcmpA
ResumeThread
SetThreadPriority
GetCurrentThread
SetPriorityClass
lstrcatA
GetEnvironmentVariableA
WinExec
GetModuleFileNameA
lstrlenA
GetLastError
CopyFileA
GetSystemDirectoryA
CompareStringW
CompareStringA
CloseHandle
GlobalMemoryStatus
GetComputerNameA
GetCurrentProcess
GetTempPathA
DeleteFileA
ExitProcess
lstrcpyA
CreateProcessA
TerminateProcess
CreateThread
LoadLibraryA
GetProcAddress
FreeLibrary
Sleep
ExitThread
GetShortPathNameA
GetTickCount
GetStringTypeW
GetStringTypeA
LCMapStringW
SetEnvironmentVariableA
LCMapStringA
MultiByteToWideChar
SetStdHandle
FlushFileBuffers
GetOEMCP
GetACP
GetCPInfo
SetFilePointer
WriteFile
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
GetTimeZoneInformation
GetSystemTime
GetLocalTime
HeapAlloc
RtlUnwind
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
HeapDestroy
HeapCreate
VirtualFree
HeapFree
VirtualAlloc
HeapReAlloc
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
user32
wsprintfA
ExitWindowsEx
advapi32
StartServiceA
RegOpenKeyA
RegSetValueExA
CloseServiceHandle
StartServiceCtrlDispatcherA
RegisterServiceCtrlHandlerA
SetServiceStatus
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
LookupPrivilegeValueA
AdjustTokenPrivileges
OpenProcessToken
OpenSCManagerA
OpenServiceA
DeleteService
CreateServiceA
shell32
ShellExecuteA
ws2_32
gethostbyname
inet_ntoa
send
connect
closesocket
recv
WSASocketA
setsockopt
htons
inet_addr
sendto
WSACleanup
WSAStartup
WSAGetLastError
socket
htonl
Sections
.text Size: 48KB - Virtual size: 45KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
niua Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ