Static task
static1
Behavioral task
behavioral1
Sample
e0dfb50d544ec355cd56374677e97e1e.exe
Resource
win7-20240221-en
General
-
Target
e0dfb50d544ec355cd56374677e97e1e
-
Size
4.1MB
-
MD5
e0dfb50d544ec355cd56374677e97e1e
-
SHA1
c4cb9fa8cdfab22b77c9c84cbb353c37edfd58d6
-
SHA256
0aca64d7066e48d14f232f01d55d128b875b2de0a29f1e7fee7e980e5a5a9a53
-
SHA512
016308415cb45a702756a27bd37dab1fda9d57924896ac37e12ac77dd0c09e240ee5de90c5dd092174d34fbcf1289fe5617b0b0297b0f09fd5a8bbe94553a225
-
SSDEEP
98304:JbnQlG+e2f0tl5t/+VO9ql3+Mmw2m7c57giraEkq1AIcO:JbQl3mtR/tc+MYQdIb
Malware Config
Signatures
Files
-
e0dfb50d544ec355cd56374677e97e1e.exe windows:6 windows x86 arch:x86
5b05faa1e3cabad37c86cad478e55916
Code Sign
71:1f:a8:b2:95:db:61:a0:4e:d1:61:39:7a:f7:27:21Certificate
IssuerCN=Samsung Galaxy Tab A 8.0 2019 32GBNot Before02-08-2021 21:52Not After03-08-2031 21:52SubjectCN=Samsung Galaxy Tab A 8.0 2019 32GB8c:77:a0:00:8f:f4:d1:b0:c6:3d:9f:3a:48:83:8d:6bCertificate
IssuerCN=Sectigo RSA Time Stamping CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GBNot Before23-10-2020 00:00Not After22-01-2032 23:59SubjectCN=Sectigo RSA Time Stamping Signer #2,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GBExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
30:0f:6f:ac:dd:66:98:74:7c:a9:46:36:a7:78:2d:b9Certificate
IssuerCN=USERTrust RSA Certification Authority,O=The USERTRUST Network,L=Jersey City,ST=New Jersey,C=USNot Before02-05-2019 00:00Not After18-01-2038 23:59SubjectCN=Sectigo RSA Time Stamping CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GBExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
62:61:4c:1c:4b:47:cd:e2:99:92:ea:ab:a3:0b:3d:8b:4a:dc:e5:4c:f2:df:92:9d:ce:6a:c3:49:5c:a2:eb:afSigner
Actual PE Digest62:61:4c:1c:4b:47:cd:e2:99:92:ea:ab:a3:0b:3d:8b:4a:dc:e5:4c:f2:df:92:9d:ce:6a:c3:49:5c:a2:eb:afDigest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
Sleep
GetLastError
GetFileAttributesA
CreateFileA
LoadLibraryA
CloseHandle
GetSystemInfo
CreateThread
HeapAlloc
GetThreadContext
GetProcAddress
ResumeThread
LocalFree
GetFileSize
ReadProcessMemory
GetProcessHeap
FreeLibrary
CreateProcessA
CreateDirectoryA
SetThreadContext
WriteConsoleW
SetEndOfFile
HeapReAlloc
HeapSize
GetTimeZoneInformation
GetComputerNameExW
SuspendThread
GetVersionExW
WaitForSingleObject
GetTempPathW
CreateMutexW
GetModuleFileNameW
VirtualAlloc
WriteFile
VirtualFree
HeapFree
WriteProcessMemory
GetModuleFileNameA
VirtualAllocEx
ReadFile
FlushFileBuffers
GetStringTypeW
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindNextFileW
FindFirstFileExW
FindClose
ReadConsoleW
SetFilePointerEx
GetFileSizeEx
GetConsoleMode
GetConsoleCP
SetStdHandle
GetFullPathNameW
GetCurrentDirectoryW
DeleteFileW
DecodePointer
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
GetModuleHandleW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
GetCurrentProcess
TerminateProcess
RaiseException
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
RtlUnwind
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
ExitProcess
GetModuleHandleExW
CreateFileW
GetDriveTypeW
GetFileInformationByHandle
GetFileType
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetStdHandle
GetCommandLineA
GetCommandLineW
MultiByteToWideChar
CompareStringW
LCMapStringW
LocalAlloc
LocalFree
GetModuleFileNameW
GetProcessAffinityMask
SetProcessAffinityMask
SetThreadAffinityMask
Sleep
ExitProcess
FreeLibrary
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
GetDC
GetSystemMetrics
ReleaseDC
GetProcessWindowStation
GetUserObjectInformationW
gdi32
CreateCompatibleBitmap
SelectObject
CreateCompatibleDC
DeleteObject
BitBlt
advapi32
RegQueryValueExA
RegOpenKeyExA
ConvertSidToStringSidW
GetUserNameW
LookupAccountNameW
RegCloseKey
shell32
ShellExecuteA
ShellExecuteExW
wininet
HttpOpenRequestA
InternetOpenUrlW
InternetWriteFile
InternetReadFile
InternetConnectA
HttpSendRequestA
InternetCloseHandle
InternetOpenA
InternetOpenUrlA
HttpSendRequestExW
HttpEndRequestW
InternetOpenW
HttpAddRequestHeadersA
gdiplus
GdipSaveImageToFile
GdipGetImageEncodersSize
GdipDisposeImage
GdipCreateBitmapFromHBITMAP
GdipGetImageEncoders
GdiplusShutdown
GdiplusStartup
Sections
.text Size: - Virtual size: 152KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
🈷️ Size: - Virtual size: 1.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
🈷️ Size: 3.9MB - Virtual size: 3.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 104KB - Virtual size: 846KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ