Static task
static1
Behavioral task
behavioral1
Sample
8b9225a9dd2d3ddccddde1316934cdaa34fbe12dc8c24a857520d38fe72ce70b.exe
Resource
win7-20240220-en
General
-
Target
8b9225a9dd2d3ddccddde1316934cdaa34fbe12dc8c24a857520d38fe72ce70b
-
Size
4.1MB
-
MD5
26ac9ec482eb11507ed3ebe21c41dbd5
-
SHA1
d647768aa1e70278cc4d79b92bdecc0d7b6e91e5
-
SHA256
8b9225a9dd2d3ddccddde1316934cdaa34fbe12dc8c24a857520d38fe72ce70b
-
SHA512
de6ec1da8b3ecd61029c3c5a4bc1c62dac7ad0114d8cb41934fb398965fbea0eee7d1482d930f5e95ccc14d8e340735a82f3020fa0b1ba486160a855b683a80c
-
SSDEEP
98304:xFoUXx4FFPk6h7E3HD1MAoxHSphaK6vPcx:xFLXx+Fc0aD17aK6vPi
Malware Config
Signatures
Files
-
8b9225a9dd2d3ddccddde1316934cdaa34fbe12dc8c24a857520d38fe72ce70b.exe windows:5 windows x86 arch:x86
59c8dd4ac2c97748fa2f414e5bacf8da
Code Sign
a5:8a:35:57:dd:a6:ba:4e:a7:33:1c:92:d7:62:f6:a1Certificate
IssuerCN=52251f5711571c0f0d0d243a002f3139341c263d07362111531206573b1100053331,POSTALCODE=10700,ST=0b1c1115005f5c4e110211020c100803061f0e00074b0c1a02+ST=0b1c1115494a5c0e46050a0d120f1645561d521a15010e0a07500703161643105207180c51000c010f1413070a07025344080a0019190c561800501c570a055b0c0b0a070bNot Before08/03/2024, 17:08Not After08/03/2025, 17:08SubjectCN=52251f5711571c0f0d0d243a002f3139341c263d07362111531206573b1100053331,POSTALCODE=10700,ST=0b1c1115005f5c4e110211020c100803061f0e00074b0c1a02+ST=0b1c1115494a5c0e46050a0d120f1645561d521a15010e0a07500703161643105207180c51000c010f1413070a07025344080a0019190c561800501c570a055b0c0b0a070b7d:28:7a:ca:71:91:b6:31:71:c5:f7:2c:fc:d7:14:7f:d3:bb:9b:b2:10:2f:8a:5f:0e:e4:78:f2:57:f5:bf:ccSigner
Actual PE Digest7d:28:7a:ca:71:91:b6:31:71:c5:f7:2c:fc:d7:14:7f:d3:bb:9b:b2:10:2f:8a:5f:0e:e4:78:f2:57:f5:bf:ccDigest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetSystemDefaultLangID
GetFileSize
WriteConsoleOutputCharacterW
LocalCompact
SystemTimeToTzSpecificLocalTime
HeapAlloc
ZombifyActCtx
CreateJobObjectW
CreateHardLinkA
CreateNamedPipeW
WideCharToMultiByte
LoadLibraryW
GetConsoleAliasExesLengthW
GetFileAttributesW
GetModuleFileNameW
CompareStringW
GetLastError
GetProcessHeaps
SetStdHandle
BuildCommDCBW
LoadLibraryA
UnhandledExceptionFilter
InterlockedExchangeAdd
LocalAlloc
DeleteTimerQueue
AddAtomA
VirtualProtect
GetCurrentDirectoryA
FatalAppExitA
ReleaseMutex
FileTimeToLocalFileTime
GlobalAddAtomW
GetStringTypeW
GetCommandLineW
HeapSetInformation
GetStartupInfoW
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
DecodePointer
IsProcessorFeaturePresent
GetProcAddress
GetModuleHandleW
ExitProcess
WriteFile
GetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
RaiseException
LeaveCriticalSection
EnterCriticalSection
HeapFree
Sleep
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
RtlUnwind
HeapSize
HeapReAlloc
LCMapStringW
MultiByteToWideChar
user32
GetKeyboardState
LoadIconW
GetClassLongW
Sections
.text Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4.0MB - Virtual size: 4.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 26.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 61KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ