Static task
static1
Behavioral task
behavioral1
Sample
96fd2c767c6a8089f043e99bb223d64e230989eeac1d61c05d2145b8f1399721.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
96fd2c767c6a8089f043e99bb223d64e230989eeac1d61c05d2145b8f1399721.exe
Resource
win10v2004-20240412-en
General
-
Target
96fd2c767c6a8089f043e99bb223d64e230989eeac1d61c05d2145b8f1399721
-
Size
58.9MB
-
MD5
0fedf8bf7bc262a96af8452192ec52fa
-
SHA1
d8277eef8f1cacaba271667d60f20033a64c26a7
-
SHA256
96fd2c767c6a8089f043e99bb223d64e230989eeac1d61c05d2145b8f1399721
-
SHA512
87cde829445b892ba8b25f64130f897bd280ebac14eac8aea26d724f2484d84453da10de2fce591879a8ddf5d5a57e061cef9797bdfdf0ca24822fcbdf359478
-
SSDEEP
1572864:1J2ethRZhWG4ZkmeUXY8kINViYM1py69dAjrIDCF:1J2ahntN8vViYMPyOWjrIDE
Malware Config
Signatures
Files
-
96fd2c767c6a8089f043e99bb223d64e230989eeac1d61c05d2145b8f1399721.exe windows:5 windows x86 arch:x86
0ac29b211097b42108cd35e880692227
Code Sign
01Certificate
IssuerCN=Microsoft Authenticode(tm) Root Authority,O=MSFT,C=USNot Before01/01/1995, 08:00Not After31/12/1999, 23:59SubjectCN=Microsoft Authenticode(tm) Root Authority,O=MSFT,C=USc1:00:8b:3c:3c:88:11:d1:3e:f6:63:ec:df:40Certificate
IssuerCN=Microsoft Root Authority,OU=Copyright (c) 1997 Microsoft Corp.+OU=Microsoft CorporationNot Before10/01/1997, 07:00Not After31/12/2020, 07:00SubjectCN=Microsoft Root Authority,OU=Copyright (c) 1997 Microsoft Corp.+OU=Microsoft Corporation61:1c:b2:8a:00:00:00:00:00:26Certificate
IssuerCN=Microsoft Code Verification Root,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before15/04/2011, 19:41Not After15/04/2021, 19:51SubjectCN=DigiCert Assured ID Root CA,OU=www.digicert.com,O=DigiCert Inc,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
0e:9b:18:8e:f9:d0:2d:e7:ef:db:50:e2:08:40:18:5aCertificate
IssuerCN=DigiCert Assured ID Root CA,OU=www.digicert.com,O=DigiCert Inc,C=USNot Before01/08/2022, 00:00Not After09/11/2031, 23:59SubjectCN=DigiCert Trusted Root G4,OU=www.digicert.com,O=DigiCert Inc,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
79:ad:16:a1:4a:a0:a5:ad:4c:73:58:f4:07:13:2e:65Certificate
IssuerCN=Microsoft Root Certificate Authority,0.9.2342.19200300.100.1.25=#13096d6963726f736f6674,0.9.2342.19200300.100.1.25=#1303636f6dNot Before09/05/2001, 23:19Not After09/05/2021, 23:28SubjectCN=Microsoft Root Certificate Authority,0.9.2342.19200300.100.1.25=#13096d6963726f736f6674,0.9.2342.19200300.100.1.25=#1303636f6dKey Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
07:36:37:b7:24:54:7c:d8:47:ac:fd:28:66:2a:5e:5bCertificate
IssuerCN=DigiCert Trusted Root G4,OU=www.digicert.com,O=DigiCert Inc,C=USNot Before23/03/2022, 00:00Not After22/03/2037, 23:59SubjectCN=DigiCert Trusted G4 RSA4096 SHA256 TimeStamping CA,O=DigiCert\, Inc.,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
08:ad:40:b2:60:d2:9c:4c:9f:5e:cd:a9:bd:93:ae:d9Certificate
IssuerCN=DigiCert Trusted Root G4,OU=www.digicert.com,O=DigiCert Inc,C=USNot Before29/04/2021, 00:00Not After28/04/2036, 23:59SubjectCN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1,O=DigiCert\, Inc.,C=USExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
05:44:af:f3:94:9d:08:39:a6:bf:db:3f:5f:e5:61:16Certificate
IssuerCN=DigiCert Trusted G4 RSA4096 SHA256 TimeStamping CA,O=DigiCert\, Inc.,C=USNot Before14/07/2023, 00:00Not After13/10/2034, 23:59SubjectCN=DigiCert Timestamp 2023,O=DigiCert\, Inc.,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
72:94:04:10:1f:3e:0c:a3:47:83:7f:ca:17:5a:84:38Certificate
IssuerCN=Microsoft Code Verification Root,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USNot Before01/11/2005, 13:46Not After01/11/2025, 13:54SubjectCN=Microsoft Code Verification Root,O=Microsoft Corporation,L=Redmond,ST=Washington,C=USKey Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
KeyUsageCertSign
KeyUsageCRLSign
0a:40:5c:dd:b4:11:68:04:d6:d5:dd:b3:a3:66:33:b7Certificate
IssuerCN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1,O=DigiCert\, Inc.,C=USNot Before21/10/2021, 00:00Not After11/10/2024, 23:59SubjectSERIALNUMBER=91440400324837464A,CN=Zhuhai Pantum Electronics Co.\, Ltd.,O=Zhuhai Pantum Electronics Co.\, Ltd.,L=珠海市,ST=广东省,C=CN,1.3.6.1.4.1.311.60.2.1.2=#0c09e5b9bfe4b89ce79c81,1.3.6.1.4.1.311.60.2.1.3=#1302434e,2.5.4.15=#131450726976617465204f7267616e697a6174696f6eExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
86:a0:2d:87:67:e9:9f:42:9e:19:0d:3e:11:c6:0d:18:9c:f7:45:ab:39:d6:5e:b7:9a:45:6c:f0:20:88:93:5aSigner
Actual PE Digest86:a0:2d:87:67:e9:9f:42:9e:19:0d:3e:11:c6:0d:18:9c:f7:45:ab:39:d6:5e:b7:9a:45:6c:f0:20:88:93:5aDigest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ord17
kernel32
GetLastError
CreateProcessW
GetStartupInfoW
GetCommandLineW
SetLastError
GetDiskFreeSpaceExW
SetFileAttributesW
Sleep
GetExitCodeThread
CreateThread
SystemTimeToFileTime
GetLocalTime
GetFileAttributesW
CreateDirectoryW
lstrlenA
WriteFile
GetStdHandle
GetModuleHandleW
LockResource
LoadResource
SizeofResource
FindResourceExA
MulDiv
GlobalFree
GlobalAlloc
lstrcmpiA
GetSystemDefaultUILanguage
GetSystemDefaultLCID
GetUserDefaultUILanguage
MultiByteToWideChar
GetLocaleInfoW
lstrcmpiW
GetEnvironmentVariableW
SetCurrentDirectoryW
lstrcmpW
RemoveDirectoryW
FindClose
FindNextFileW
DeleteFileW
FindFirstFileW
CreateJobObjectW
GetTempPathW
WideCharToMultiByte
CompareFileTime
ExpandEnvironmentStringsW
GetSystemTimeAsFileTime
SetThreadLocale
LoadLibraryA
SetEnvironmentVariableW
CreateFileW
GetDriveTypeW
SetProcessWorkingSetSize
GetCurrentProcess
GetModuleFileNameW
GetVersionExW
CreateEventW
SetEvent
ResetEvent
InitializeCriticalSection
GetCurrentThreadId
GetSystemDirectoryW
TerminateThread
SuspendThread
IsBadReadPtr
LocalFree
lstrcpyW
FormatMessageW
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
VirtualAlloc
VirtualFree
GetFileSize
SetFilePointer
ReadFile
SetFileTime
SetEndOfFile
GetFileInformationByHandle
WaitForMultipleObjects
GetModuleHandleA
ResumeThread
AssignProcessToJobObject
CreateIoCompletionPort
SetInformationJobObject
GetQueuedCompletionStatus
WaitForSingleObject
CloseHandle
GetExitCodeProcess
GetProcAddress
lstrcatW
ExitProcess
lstrlenW
OutputDebugStringA
OutputDebugStringW
GetTickCount
GetCurrentDirectoryW
GetStartupInfoA
user32
wvsprintfW
MessageBoxW
wsprintfW
GetParent
BringWindowToTop
ShowWindow
SendMessageW
CharUpperW
KillTimer
EndDialog
DispatchMessageW
GetMessageW
SetTimer
SetWindowPos
GetWindowRect
GetDesktopWindow
CreateWindowExW
CreateWindowExA
GetSystemMenu
EnableMenuItem
EnableWindow
MessageBeep
LoadIconW
LoadImageW
SetWindowsHookExW
PtInRect
CallNextHookEx
DefWindowProcW
CallWindowProcW
DrawIconEx
DialogBoxIndirectParamW
GetWindow
ClientToScreen
GetDC
DrawTextW
SystemParametersInfoW
GetSystemMetrics
SetFocus
UnhookWindowsHookEx
SetWindowLongW
GetClientRect
GetDlgItem
IsWindow
GetKeyState
MessageBoxA
DestroyWindow
GetSysColor
SetWindowTextW
GetWindowTextLengthW
GetWindowTextW
wsprintfA
GetClassNameA
GetWindowLongW
GetMenu
GetWindowDC
ScreenToClient
CopyImage
wvsprintfA
ReleaseDC
gdi32
SelectObject
CreateCompatibleDC
CreateCompatibleBitmap
GetDeviceCaps
DeleteObject
CreateFontIndirectW
SetStretchBltMode
StretchBlt
GetCurrentObject
GetObjectW
DeleteDC
advapi32
FreeSid
AllocateAndInitializeSid
CheckTokenMembership
shell32
SHGetFileInfoW
SHBrowseForFolderW
SHGetPathFromIDListW
SHGetMalloc
SHGetSpecialFolderPathW
ShellExecuteExW
ShellExecuteW
ole32
CoInitialize
CreateStreamOnHGlobal
CoCreateInstance
oleaut32
SysAllocStringLen
SysFreeString
OleLoadPicture
SysAllocString
VariantClear
msvcrt
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
??1type_info@@UAE@XZ
_onexit
__dllonexit
realloc
wcsstr
free
malloc
_CxxThrowException
wcscmp
_beginthreadex
_EH_prolog
?_set_new_handler@@YAP6AHI@ZP6AHI@Z@Z
strncmp
wcsncmp
wcsncpy
strncpy
_wcsnicmp
memcpy
memmove
memset
_wtol
??2@YAPAXI@Z
memcmp
_purecall
??3@YAXPAX@Z
_except_handler3
_controlfp
Sections
.text Size: 107KB - Virtual size: 107KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 281KB - Virtual size: 281KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ