Static task
static1
Behavioral task
behavioral1
Sample
20da35189ce4f3bad3c10877c9ab8f565e2a2c14dd5b6e6c5d555c50a0da73f2.exe
Resource
win7-20240221-en
General
-
Target
20da35189ce4f3bad3c10877c9ab8f565e2a2c14dd5b6e6c5d555c50a0da73f2
-
Size
4.1MB
-
MD5
8daf5f3cee48b123e360aaf2505fd09d
-
SHA1
cd0092f4a1bc5057fd927449aa7b958a1a2db437
-
SHA256
20da35189ce4f3bad3c10877c9ab8f565e2a2c14dd5b6e6c5d555c50a0da73f2
-
SHA512
5705eaff0494d8291bd4764eeb9356ef9cbd67596c5c97172262932c0b2d289a9d61828660d2af320271347873d54935c54b5bff74644827f24ed9333d8e3f67
-
SSDEEP
98304:KO2zUpWNrjklINI/lZn+oRLTehkXP679YkuHforQIIB2F1JUz:KOKZjkcIn+8LybuiIkF1i
Malware Config
Signatures
Files
-
20da35189ce4f3bad3c10877c9ab8f565e2a2c14dd5b6e6c5d555c50a0da73f2.exe windows:5 windows x86 arch:x86
dff9f8c806e8bfa8a5ce2ba6c42139a9
Code Sign
59:de:fe:50:86:54:88:e8:c5:ec:01:fd:3f:35:60:a3Certificate
IssuerCN=522036264b3c07530c0910253d36220330152b1b14292e1a512d092b0b3746071333,POSTALCODE=10839,ST=0b1c1115005f5c4e010b00161801040700070818064b0c1a02+ST=0b1c1115494a5c031c0b02081a1750475310151f070b57051217441d47031d1512195d501615110b570d0a17550b1209150a45131d1315075a001044160a055b0c0b0a070bNot Before09/03/2024, 23:11Not After09/03/2025, 23:11SubjectCN=522036264b3c07530c0910253d36220330152b1b14292e1a512d092b0b3746071333,POSTALCODE=10839,ST=0b1c1115005f5c4e010b00161801040700070818064b0c1a02+ST=0b1c1115494a5c031c0b02081a1750475310151f070b57051217441d47031d1512195d501615110b570d0a17550b1209150a45131d1315075a001044160a055b0c0b0a070b1f:8e:6c:a4:10:6a:ab:55:d7:89:39:2e:05:86:5a:2a:0a:fd:30:dd:7b:e1:e1:2c:c9:93:d0:45:03:ee:c0:c6Signer
Actual PE Digest1f:8e:6c:a4:10:6a:ab:55:d7:89:39:2e:05:86:5a:2a:0a:fd:30:dd:7b:e1:e1:2c:c9:93:d0:45:03:ee:c0:c6Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileSize
WriteConsoleOutputCharacterW
GetConsoleAliasExesLengthA
LocalCompact
HeapAlloc
ZombifyActCtx
CreateJobObjectW
CreateHardLinkA
WideCharToMultiByte
LoadLibraryW
GetFileAttributesA
DnsHostnameToComputerNameW
GetModuleFileNameW
CompareStringW
InterlockedExchange
SetThreadLocale
GetLastError
GetProcessHeaps
CreateNamedPipeA
GetConsoleDisplayMode
GetAtomNameA
UnhandledExceptionFilter
LocalAlloc
DeleteTimerQueue
AddAtomW
FindAtomA
BuildCommDCBA
VirtualProtect
GetCurrentDirectoryA
FatalAppExitA
SetThreadAffinityMask
ReleaseMutex
FileTimeToLocalFileTime
GetCommandLineW
HeapSetInformation
GetStartupInfoW
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
IsDebuggerPresent
GetProcAddress
GetModuleHandleW
ExitProcess
DecodePointer
WriteFile
GetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
HeapFree
Sleep
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
RtlUnwind
HeapSize
HeapReAlloc
IsProcessorFeaturePresent
LCMapStringW
MultiByteToWideChar
GetStringTypeW
RaiseException
user32
LoadIconW
GetKeyboardState
Sections
.text Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4.0MB - Virtual size: 4.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 293KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 31KB - Virtual size: 4.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ