Static task
static1
Behavioral task
behavioral1
Sample
977f3ec1debe83ba2db9bef4c05c8def4a60b8dd0e6650df2b02cf7f63f151f4.exe
Resource
win7-20240221-en
General
-
Target
977f3ec1debe83ba2db9bef4c05c8def4a60b8dd0e6650df2b02cf7f63f151f4
-
Size
4.1MB
-
MD5
191865cced8d68764ab306ae907b7d85
-
SHA1
3ae412fc0c109f5813b369bdd64ba5e21f835cde
-
SHA256
977f3ec1debe83ba2db9bef4c05c8def4a60b8dd0e6650df2b02cf7f63f151f4
-
SHA512
24f5286ff8fb9a476ec145ccc176606156ddb085a438d874879a384d5a695751822aba889679365209ff91ddb611ad2710503f1b8969cffac1a4548403128c0c
-
SSDEEP
98304:JLIwtv+0q5oZ+qEH7X7wdT2Et/jX3BvGWwOk59bMWuop5T:R1xq5oZLg7wdT2Et7phW9MWJp9
Malware Config
Signatures
Files
-
977f3ec1debe83ba2db9bef4c05c8def4a60b8dd0e6650df2b02cf7f63f151f4.exe windows:5 windows x86 arch:x86
d348ab1d048ed4e038c99784da1971a1
Code Sign
9e:19:bb:b5:a0:33:64:86:ea:83:d0:a3:3e:cb:c9:d8Certificate
IssuerCN=522036264b3c07530c0910253d36220330152b1b14292e1a512d092b0b3746071333,POSTALCODE=10700,ST=0b1c1115005f5c4e010b00161801040700070818064b0c1a02+ST=0b1c1115494a5c031c0b02081a1750475310151f070b57051217441d47031d1512195d501615110b570d0a17550b1209150a45131d1315075a001044160a055b0c0b0a070bNot Before07/03/2024, 00:49Not After07/03/2025, 00:49SubjectCN=522036264b3c07530c0910253d36220330152b1b14292e1a512d092b0b3746071333,POSTALCODE=10700,ST=0b1c1115005f5c4e010b00161801040700070818064b0c1a02+ST=0b1c1115494a5c031c0b02081a1750475310151f070b57051217441d47031d1512195d501615110b570d0a17550b1209150a45131d1315075a001044160a055b0c0b0a070be6:88:dc:ba:c8:e2:ac:6e:30:26:13:e4:4b:de:bc:72:ef:e9:02:28:01:0a:10:82:19:40:a8:1f:02:fa:90:5aSigner
Actual PE Digeste6:88:dc:ba:c8:e2:ac:6e:30:26:13:e4:4b:de:bc:72:ef:e9:02:28:01:0a:10:82:19:40:a8:1f:02:fa:90:5aDigest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetSystemDefaultLangID
GetFileSize
MoveFileExA
WriteConsoleOutputCharacterA
SystemTimeToTzSpecificLocalTime
GlobalAddAtomA
ZombifyActCtx
GetProcessHeap
WideCharToMultiByte
LocalShrink
FatalAppExitW
GetConsoleAliasExesLengthW
GetFileAttributesA
HeapCreate
GetModuleFileNameW
CompareStringW
ReleaseSemaphore
ReplaceFileA
CreateJobObjectA
GetStdHandle
SetLastError
CreateNamedPipeA
BuildCommDCBW
LoadLibraryA
UnhandledExceptionFilter
InterlockedExchangeAdd
LocalAlloc
DeleteTimerQueue
AddAtomA
lstrcatW
VirtualProtect
GetCurrentDirectoryA
FileTimeToLocalFileTime
CreateFileW
GetCommandLineW
HeapSetInformation
GetStartupInfoW
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
DecodePointer
IsProcessorFeaturePresent
HeapAlloc
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
GetProcAddress
GetModuleHandleW
ExitProcess
WriteFile
FreeEnvironmentStringsW
GetEnvironmentStringsW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
GetLastError
InterlockedDecrement
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
RaiseException
Sleep
HeapFree
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
RtlUnwind
LoadLibraryW
HeapReAlloc
GetConsoleCP
GetConsoleMode
FlushFileBuffers
LCMapStringW
MultiByteToWideChar
GetStringTypeW
SetFilePointer
HeapSize
CloseHandle
WriteConsoleW
SetStdHandle
user32
LoadIconA
GetClassLongW
SetKeyboardState
Sections
.text Size: 4.0MB - Virtual size: 4.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 26.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 30KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ