Static task
static1
Behavioral task
behavioral1
Sample
c37784dffc08faec5b8739ae504644958acf151137a46b2a956ad37a77b0f678.exe
Resource
win7-20240221-en
General
-
Target
c37784dffc08faec5b8739ae504644958acf151137a46b2a956ad37a77b0f678
-
Size
4.1MB
-
MD5
1c5577ee004f012686f12b812ff4de8d
-
SHA1
9de696400d8f71d5628fbd62dd12b01852043f7d
-
SHA256
c37784dffc08faec5b8739ae504644958acf151137a46b2a956ad37a77b0f678
-
SHA512
09c8730d56c2954124c851f0ad89bc9d4c4b8331c7dc262d6b19cb47b9af1cc40df0565c8d36bcf37217553a141a28b9bc82985e1197301b78e2884d09a19b09
-
SSDEEP
98304:SZy2mpndnSc8onitd+7GuclR/Kx46q1BnU79m/Ri5HAy0QODik2gj+BW3RLqn:sy5TnKon/Tcu46aBU79mUaxQODik2PBD
Malware Config
Signatures
Files
-
c37784dffc08faec5b8739ae504644958acf151137a46b2a956ad37a77b0f678.exe windows:5 windows x86 arch:x86
0c3f2cf9e47c10e842f2d44e413c1a98
Code Sign
ec:0a:d1:b5:e2:a4:cf:dd:28:d1:69:f8:28:c4:84:76Certificate
IssuerCN=52201f2f18311d572f560b271a020721531729232121351c16372a14042518241f2d,POSTALCODE=10815,ST=0b1c1115005f5c4e190c06020416111211004f1a1102+ST=0b1c1115494a5c0203141202020e504510065319025209045100410317190c5653150d02501b141f001a0d01060a52121b130a53030f08110d1453190b1a055b0c0b0a070bNot Before05/03/2024, 17:00Not After05/03/2025, 17:00SubjectCN=52201f2f18311d572f560b271a020721531729232121351c16372a14042518241f2d,POSTALCODE=10815,ST=0b1c1115005f5c4e190c06020416111211004f1a1102+ST=0b1c1115494a5c0203141202020e504510065319025209045100410317190c5653150d02501b141f001a0d01060a52121b130a53030f08110d1453190b1a055b0c0b0a070b3d:d4:46:ef:c1:ac:ea:a5:19:a3:eb:cc:34:4f:c4:0e:c5:70:85:a6:f7:9d:9c:72:56:18:8a:24:3e:b3:68:60Signer
Actual PE Digest3d:d4:46:ef:c1:ac:ea:a5:19:a3:eb:cc:34:4f:c4:0e:c5:70:85:a6:f7:9d:9c:72:56:18:8a:24:3e:b3:68:60Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\natijip\degabemek.pdb
Imports
kernel32
GetConsoleAliasExesLengthA
InterlockedIncrement
ReadConsoleA
InterlockedDecrement
AddConsoleAliasW
GetFileAttributesExA
GetTickCount
FindNextVolumeMountPointA
GetNumberFormatA
GetWindowsDirectoryA
EnumTimeFormatsA
GlobalAlloc
GetLocaleInfoW
ReadConsoleInputA
GetThreadSelectorEntry
GetVersionExW
CreateDirectoryA
GetLastError
GetProcAddress
GetLocaleInfoA
RemoveDirectoryA
LoadLibraryA
WriteConsoleA
GlobalFindAtomW
SetEnvironmentVariableA
GetModuleFileNameA
GetConsoleTitleW
GetCurrentDirectoryA
DuplicateHandle
GetCurrentProcessId
GetVolumeInformationW
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
CreateFileA
FindResourceA
VirtualAlloc
GetComputerNameA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
GetStartupInfoA
HeapAlloc
HeapFree
RaiseException
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
GetFileType
DeleteCriticalSection
WriteFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
FlushFileBuffers
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
Sleep
ExitProcess
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapCreate
VirtualFree
QueryPerformanceCounter
GetSystemTimeAsFileTime
HeapReAlloc
GetModuleHandleA
SetFilePointer
InitializeCriticalSectionAndSpinCount
RtlUnwind
GetConsoleOutputCP
WriteConsoleW
MultiByteToWideChar
SetStdHandle
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapSize
CloseHandle
user32
CharLowerBuffA
CharUpperBuffW
LoadKeyboardLayoutW
GetAltTabInfoA
UnregisterClassA
gdi32
StretchDIBits
advapi32
ReadEventLogA
shell32
FindExecutableW
winhttp
WinHttpCheckPlatform
Sections
.text Size: 4.0MB - Virtual size: 4.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 76KB - Virtual size: 22.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ