Static task
static1
Behavioral task
behavioral1
Sample
66c0df7ea2c11ed88444f7bb537b67a64c6a223e5b70e2861d77fe428f8fb99f.exe
Resource
win10v2004-20240412-en
General
-
Target
66c0df7ea2c11ed88444f7bb537b67a64c6a223e5b70e2861d77fe428f8fb99f
-
Size
4.2MB
-
MD5
6d4b9cc77646d6ce17c814662052ead3
-
SHA1
1701bd3b5a678f0fc7f870ba73d917d29485ac15
-
SHA256
66c0df7ea2c11ed88444f7bb537b67a64c6a223e5b70e2861d77fe428f8fb99f
-
SHA512
e785a3b438e6f4129bea99407ec864c15af9685f7520f9b769c7cf3db9c8078b5f5028e9f1b2f54508a7c81e1bfd27b38cb8ee511ed58a7c5b77bf3975f362db
-
SSDEEP
98304:Kqf5fJQh40Wc7jxQPBbN47I/uzg7UPB5yC7IxKw:Df1JiX0C7I2U7w/Sow
Malware Config
Signatures
Files
-
66c0df7ea2c11ed88444f7bb537b67a64c6a223e5b70e2861d77fe428f8fb99f.exe windows:5 windows x86 arch:x86
9d610f0fc62075f620c7e94e08d0d24d
Code Sign
46:69:6e:7c:52:4f:a9:25:da:88:40:45:4e:62:9e:15Certificate
IssuerCN=522434573635311625120101053d123d53210e113336571014061e5d361525000421,POSTALCODE=10826,ST=0b1c1115005f5c4e11160813180402164b1c1312+ST=0b1c1115494a5c111413080004511740571216140506085f501c465147571b51505119141402511b5716571c511b0904121c030e061111050a0600110102055b0c0b0a070bNot Before16/04/2024, 23:54Not After16/04/2025, 23:54SubjectCN=522434573635311625120101053d123d53210e113336571014061e5d361525000421,POSTALCODE=10826,ST=0b1c1115005f5c4e11160813180402164b1c1312+ST=0b1c1115494a5c111413080004511740571216140506085f501c465147571b51505119141402511b5716571c511b0904121c030e061111050a0600110102055b0c0b0a070bcc:bb:2d:91:46:bc:b8:0a:02:0c:f0:43:a7:09:2d:18:a7:67:5d:48:d6:13:ce:78:17:2c:7e:db:4d:40:5c:01Signer
Actual PE Digestcc:bb:2d:91:46:bc:b8:0a:02:0c:f0:43:a7:09:2d:18:a7:67:5d:48:d6:13:ce:78:17:2c:7e:db:4d:40:5c:01Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDateFormatW
SetDefaultCommConfigA
FindVolumeClose
GetLocaleInfoA
EnumCalendarInfoW
SetFirmwareEnvironmentVariableA
GetComputerNameW
LockFile
GetModuleHandleW
IsBadReadPtr
GetConsoleAliasesLengthA
EnumTimeFormatsA
SetCommTimeouts
GlobalAlloc
LoadLibraryW
GetAtomNameW
SetConsoleTitleA
GetProcAddress
GetProcessHeaps
CreateNamedPipeA
GetConsoleDisplayMode
BuildCommDCBW
LoadLibraryA
SetCurrentDirectoryW
WaitForMultipleObjects
GetModuleFileNameA
FreeEnvironmentStringsW
VirtualProtect
GetCurrentDirectoryA
SetCalendarInfoA
FindAtomW
LocalFileTimeToFileTime
GetLastError
HeapReAlloc
HeapAlloc
GetStartupInfoW
RaiseException
RtlUnwind
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
Sleep
HeapSize
ExitProcess
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapCreate
VirtualFree
VirtualAlloc
WriteFile
GetStdHandle
GetModuleFileNameW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
SetFilePointer
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
InitializeCriticalSectionAndSpinCount
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
CreateFileA
CloseHandle
FlushFileBuffers
Sections
.text Size: 41KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4.0MB - Virtual size: 4.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 39.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 55KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ