Static task
static1
Behavioral task
behavioral1
Sample
f341a49386ec2b702dbbdd39d5010b9c1b8742d678864844f0012b3e4ee6a8cb.exe
Resource
win7-20240221-en
General
-
Target
f341a49386ec2b702dbbdd39d5010b9c1b8742d678864844f0012b3e4ee6a8cb
-
Size
4.1MB
-
MD5
72c5c455824eb7c3791ed917541e22cf
-
SHA1
c4168eb84e3e48650bc6742256d290a81c98d9b9
-
SHA256
f341a49386ec2b702dbbdd39d5010b9c1b8742d678864844f0012b3e4ee6a8cb
-
SHA512
d0015dea74a704fb2c5268e4d8a7cfb57d57e24c5dbb6f57480b06827bc1ce1efa419e57b811562b028e2614521763d18993ce415092b4139d2960fc07c93c8c
-
SSDEEP
98304:XfoZjwaqLS9kJMOnAKemjlsux99jgxBERa1fbjFmM+dfPY:XQjwJpM4AK9sunxgxag1fbvB
Malware Config
Signatures
Files
-
f341a49386ec2b702dbbdd39d5010b9c1b8742d678864844f0012b3e4ee6a8cb.exe windows:5 windows x86 arch:x86
e368dc091dc26b6066442b735ec875e5
Code Sign
23:34:4e:b7:c1:8e:0e:63:46:1a:f8:5d:93:38:9d:5cCertificate
IssuerCN=522910322628070b250c52200b542f1a57031b422732351e332f4620190820022d0b,POSTALCODE=10829,ST=0b1c1115005f5c4e010b00101c041100031a0d10104b111d+ST=0b1c1115494a5c18101602500b53081d121c021c1b120f07110e12511d161a5003091c030c1053460e4113160e181d130101060d401252070f0f08001312055b0c0b0a070bNot Before22-01-2024 16:49Not After21-01-2025 16:49SubjectCN=522910322628070b250c52200b542f1a57031b422732351e332f4620190820022d0b,POSTALCODE=10829,ST=0b1c1115005f5c4e010b00101c041100031a0d10104b111d+ST=0b1c1115494a5c18101602500b53081d121c021c1b120f07110e12511d161a5003091c030c1053460e4113160e181d130101060d401252070f0f08001312055b0c0b0a070b38:4c:a4:30:be:8a:a4:7f:b9:0e:a4:70:47:c4:c8:6e:3c:3b:dd:91:59:c4:a6:ee:2d:52:fc:3b:9f:6c:f4:0fSigner
Actual PE Digest38:4c:a4:30:be:8a:a4:7f:b9:0e:a4:70:47:c4:c8:6e:3c:3b:dd:91:59:c4:a6:ee:2d:52:fc:3b:9f:6c:f4:0fDigest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\mahipilip.pdb
Imports
kernel32
GetSystemDefaultLangID
InterlockedDecrement
QueryDosDeviceA
MoveFileWithProgressA
GetModuleHandleW
GetTickCount
VirtualFree
GetConsoleAliasesLengthA
FreeConsole
GetModuleFileNameW
SetComputerNameExW
GetStartupInfoW
CreateJobObjectA
GetLastError
SetLastError
ReadConsoleOutputCharacterA
GetProcAddress
VirtualAlloc
SetVolumeLabelW
LoadLibraryA
WriteConsoleA
InterlockedExchangeAdd
LocalAlloc
MoveFileA
FindFirstVolumeMountPointW
RemoveDirectoryW
FindNextChangeNotification
GlobalFindAtomW
GetStringTypeW
PurgeComm
GetFileAttributesExW
WaitForDebugEvent
WriteConsoleOutputAttribute
SetCalendarInfoA
GetCurrentProcessId
DeleteFileA
MultiByteToWideChar
Sleep
ExitProcess
GetCPInfo
InterlockedIncrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
CloseHandle
EnterCriticalSection
LeaveCriticalSection
RaiseException
WriteFile
GetStdHandle
GetModuleFileNameA
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
HeapCreate
QueryPerformanceCounter
GetSystemTimeAsFileTime
LCMapStringA
WideCharToMultiByte
LCMapStringW
GetStringTypeA
GetLocaleInfoA
HeapAlloc
HeapReAlloc
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
RtlUnwind
GetModuleHandleA
HeapSize
GetConsoleOutputCP
WriteConsoleW
SetFilePointer
CreateFileA
Sections
.text Size: 4.0MB - Virtual size: 4.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 4.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 80KB - Virtual size: 952KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ