Static task
static1
Behavioral task
behavioral1
Sample
14245951acfdfec22c06607abbab630d84acc83d9acaf81ac49e5bb95a3f7554.exe
Resource
win7-20240220-en
General
-
Target
14245951acfdfec22c06607abbab630d84acc83d9acaf81ac49e5bb95a3f7554
-
Size
4.2MB
-
MD5
38c13e39c1d7d2ced9be13c68661f527
-
SHA1
9876bc7c409f740237923b5433ee30d1ab8ab3a2
-
SHA256
14245951acfdfec22c06607abbab630d84acc83d9acaf81ac49e5bb95a3f7554
-
SHA512
2c5349f707ba1e752f7c8cd07b463295c1a590367c65dca60f2dfad621a70754776ec78195695594c1e1e0532c658c7938611c27da674ee4683bd9a206da0170
-
SSDEEP
98304:nvvIYFkf97U8Smd2FXzGA7MbO04TlyWETdNieVa+0+20BN:XIYKFvSP1zJ7Ma04T0riMldBN
Malware Config
Signatures
Files
-
14245951acfdfec22c06607abbab630d84acc83d9acaf81ac49e5bb95a3f7554.exe windows:5 windows x86 arch:x86
c463a0c2671b9b70a29df3893c358cb8
Code Sign
dc:b2:60:58:d4:c7:82:3f:42:14:0d:e1:39:c2:75:5aCertificate
IssuerCN=522434573635311625120101053d123d53210e113336571014061e5d361525000421,POSTALCODE=10815,ST=0b1c1115005f5c4e11160813180402164b1c1312+ST=0b1c1115494a5c111413080004511740571216140506085f501c465147571b51505119141402511b5716571c511b0904121c030e061111050a0600110102055b0c0b0a070bNot Before07/04/2024, 13:38Not After07/04/2025, 13:38SubjectCN=522434573635311625120101053d123d53210e113336571014061e5d361525000421,POSTALCODE=10815,ST=0b1c1115005f5c4e11160813180402164b1c1312+ST=0b1c1115494a5c111413080004511740571216140506085f501c465147571b51505119141402511b5716571c511b0904121c030e061111050a0600110102055b0c0b0a070bb1:45:70:a7:5a:51:2c:9a:05:46:52:a6:87:20:8d:2e:d2:91:51:dd:3f:5f:d2:98:d3:bb:41:4e:32:05:3a:77Signer
Actual PE Digestb1:45:70:a7:5a:51:2c:9a:05:46:52:a6:87:20:8d:2e:d2:91:51:dd:3f:5f:d2:98:d3:bb:41:4e:32:05:3a:77Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
IsBadHugeReadPtr
GetCommState
HeapFree
GetComputerNameW
LockFile
ConnectNamedPipe
GetModuleHandleW
GetDateFormatA
GetUserDefaultLangID
GetCurrencyFormatW
GetConsoleCP
GlobalAlloc
VirtualFreeEx
LoadLibraryW
GetConsoleAliasExesLengthW
GetLocaleInfoA
GetAtomNameW
SetConsoleTitleA
GetShortPathNameA
SetCurrentDirectoryA
GetCurrentDirectoryW
GetProcAddress
LoadLibraryA
HeapLock
GetModuleFileNameA
FreeEnvironmentStringsW
DeleteCriticalSection
SetCalendarInfoA
CreateFileW
GetConsoleAliasesLengthW
SetDefaultCommConfigA
GetVersionExW
HeapReAlloc
HeapAlloc
ExitProcess
DecodePointer
GetCommandLineW
HeapSetInformation
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
WriteFile
GetStdHandle
GetModuleFileNameW
HeapCreate
EnterCriticalSection
LeaveCriticalSection
GetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
SetFilePointer
WideCharToMultiByte
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
Sleep
RtlUnwind
MultiByteToWideChar
HeapSize
SetStdHandle
WriteConsoleW
LCMapStringW
GetStringTypeW
IsProcessorFeaturePresent
FlushFileBuffers
ReadFile
CloseHandle
user32
LoadIconA
advapi32
RegCreateKeyA
OpenThreadToken
ReadEventLogW
Sections
.text Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4.1MB - Virtual size: 4.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 39.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 62KB - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ