Static task
static1
Behavioral task
behavioral1
Sample
beb00db00ab8a1c8444c044ecb6d4eac19e23634937146121bf9c3c8517ed7b2.exe
Resource
win7-20240221-en
General
-
Target
beb00db00ab8a1c8444c044ecb6d4eac19e23634937146121bf9c3c8517ed7b2
-
Size
4.1MB
-
MD5
094177e86f208967117d39942bef863c
-
SHA1
961b773c4f9373978a2cf7e8c985604f09926d9d
-
SHA256
beb00db00ab8a1c8444c044ecb6d4eac19e23634937146121bf9c3c8517ed7b2
-
SHA512
5121b3786061d2d1065d967b089248e7d8ed7e4aa5b7d969ce7baa04291f93faa5aaae5393b4c523886733b70a1290c6464f4dcca4ef7071099cc11a7d16a41b
-
SSDEEP
98304:pK4sikCKwOcAgetL/sGWSUIwWMfGs/QNIJvvOO0g5iA92HBL:LsiRlTOFUIwWMfGJN8vOtg0Ak
Malware Config
Signatures
Files
-
beb00db00ab8a1c8444c044ecb6d4eac19e23634937146121bf9c3c8517ed7b2.exe windows:5 windows x86 arch:x86
6e6adc81408d03ab93cf4a3c059fdf64
Code Sign
a4:d8:1a:00:45:f3:f6:22:de:6b:be:e4:25:40:b1:dbCertificate
IssuerCN=522a143c46533d0e442f37555c2422100a1455182550573d31351d0f013134332d19,POSTALCODE=10815,ST=0b1c1115005f5c4e161100021c001003011215104d0a110f+ST=0b1c1115494a5c05125116195f151d00521f0d135111515d03161110070d03151709010f5103081c0b00040b545d06080b0b050e060b08091d5301090612055b0c0b0a070bNot Before04/03/2024, 18:32Not After04/03/2025, 18:32SubjectCN=522a143c46533d0e442f37555c2422100a1455182550573d31351d0f013134332d19,POSTALCODE=10815,ST=0b1c1115005f5c4e161100021c001003011215104d0a110f+ST=0b1c1115494a5c05125116195f151d00521f0d135111515d03161110070d03151709010f5103081c0b00040b545d06080b0b050e060b08091d5301090612055b0c0b0a070b84:6c:b9:a7:56:bf:82:93:e7:26:d5:d8:0a:25:1b:78:b2:a2:9d:82:2f:23:1c:1b:14:0e:9d:60:bc:75:49:64Signer
Actual PE Digest84:6c:b9:a7:56:bf:82:93:e7:26:d5:d8:0a:25:1b:78:b2:a2:9d:82:2f:23:1c:1b:14:0e:9d:60:bc:75:49:64Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteConsoleOutputCharacterA
HeapAlloc
GlobalAddAtomA
GetCurrentActCtx
CreateJobObjectW
GetSystemDefaultLCID
FreeEnvironmentStringsA
CreateNamedPipeW
GetProcessHeap
TzSpecificLocalTimeToSystemTime
WideCharToMultiByte
LoadLibraryW
GetLocaleInfoW
GetFileAttributesA
ReplaceFileW
InterlockedExchange
GetStdHandle
GetCurrentDirectoryW
GetConsoleAliasExesLengthA
LoadLibraryA
LocalAlloc
GetFileType
AddAtomW
GetModuleFileNameA
lstrcatW
BuildCommDCBA
VirtualProtect
FatalAppExitA
ReleaseMutex
FileTimeToLocalFileTime
DeleteTimerQueueTimer
CreateFileW
SetStdHandle
SetLastError
MoveFileExA
GetCommandLineW
HeapSetInformation
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
DecodePointer
GetProcAddress
GetModuleHandleW
ExitProcess
WriteFile
GetModuleFileNameW
HeapCreate
EnterCriticalSection
LeaveCriticalSection
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
GetLastError
InterlockedDecrement
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
HeapFree
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
RtlUnwind
IsProcessorFeaturePresent
HeapSize
HeapReAlloc
GetConsoleCP
GetConsoleMode
FlushFileBuffers
LCMapStringW
MultiByteToWideChar
GetStringTypeW
SetFilePointer
CloseHandle
WriteConsoleW
user32
LoadIconW
UpdateWindow
GetClassLongA
SetKeyboardState
gdi32
GetCharWidth32W
Sections
.text Size: 4.0MB - Virtual size: 4.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 26.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ