Static task
static1
Behavioral task
behavioral1
Sample
c47cc714b39a6cdd926f0222d4837c2a3cf93861e6a9379d7614138d10eeb7ab.exe
Resource
win10v2004-20240412-en
General
-
Target
c47cc714b39a6cdd926f0222d4837c2a3cf93861e6a9379d7614138d10eeb7ab
-
Size
4.2MB
-
MD5
681190a73faf97f4764679359fc15d95
-
SHA1
fdad0d9ac37c29435b0f94e20fdd4aaf183fe3fe
-
SHA256
c47cc714b39a6cdd926f0222d4837c2a3cf93861e6a9379d7614138d10eeb7ab
-
SHA512
810caeaffce84a5e1befd2121046dd7bb6bd245e19bd9bec87f6f02f32e7708ee1d181a6a7902861a849eef9fd8fcf6555efbec870bd0c7e3336a3ec12c0d901
-
SSDEEP
98304:UU7JZ/7uURLcFeenA9dH0uQZbHI/vGTIvGlDlXY4zncLu:UcbuURLCeprU/ZbHFTYanT
Malware Config
Signatures
Files
-
c47cc714b39a6cdd926f0222d4837c2a3cf93861e6a9379d7614138d10eeb7ab.exe windows:5 windows x86 arch:x86
84884247a206fecc344017ef4b7fe181
Code Sign
c0:6a:a4:ac:5a:1d:f8:16:5e:c6:b4:2b:c2:cb:e2:8cCertificate
IssuerCN=525c3d3f1b06302b310410391d3f23471542520105293b2253150610173842041410,POSTALCODE=10803,ST=0b1c1115005f5c4e111608130d1716070407125b0c1704+ST=0b1c1115494a5c024150110d05170e09031e0a1f1a0150025113451d111807075354195315000e091843540114031f0f4053060e0414150c0210571f0a0a055b0c0b0a070bNot Before22/04/2024, 23:21Not After22/04/2025, 23:21SubjectCN=525c3d3f1b06302b310410391d3f23471542520105293b2253150610173842041410,POSTALCODE=10803,ST=0b1c1115005f5c4e111608130d1716070407125b0c1704+ST=0b1c1115494a5c024150110d05170e09031e0a1f1a0150025113451d111807075354195315000e091843540114031f0f4053060e0414150c0210571f0a0a055b0c0b0a070bec:45:24:d0:1f:6f:76:31:6a:e1:70:bb:a0:cf:e1:b3:63:bd:49:cc:05:bc:31:9e:da:6f:92:91:ba:33:1b:5dSigner
Actual PE Digestec:45:24:d0:1f:6f:76:31:6a:e1:70:bb:a0:cf:e1:b3:63:bd:49:cc:05:bc:31:9e:da:6f:92:91:ba:33:1b:5dDigest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLocaleInfoA
GetConsoleAliasExesLengthA
GetComputerNameW
GetModuleHandleW
GetConsoleAliasesLengthA
GetDateFormatA
SetCommState
GlobalAlloc
LoadLibraryW
HeapDestroy
FindNextVolumeW
IsBadWritePtr
GlobalUnfix
GetProcAddress
GetProcessHeaps
SetFirmwareEnvironmentVariableW
EnumCalendarInfoA
SetCalendarInfoW
SetConsoleDisplayMode
SetCurrentDirectoryW
WaitForMultipleObjects
GetModuleFileNameA
SetConsoleTitleW
FreeEnvironmentStringsW
BuildCommDCBA
VirtualProtect
GetCurrentDirectoryA
EnumDateFormatsW
FindAtomW
GetFileInformationByHandle
SetFileAttributesW
GetVolumeInformationW
LocalFileTimeToFileTime
LoadLibraryA
GetFileSize
GetCommandLineA
GetStartupInfoA
RaiseException
RtlUnwind
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
GetLastError
HeapFree
EnterCriticalSection
LeaveCriticalSection
Sleep
ExitProcess
WriteFile
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
SetFilePointer
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
VirtualAlloc
HeapReAlloc
HeapSize
InitializeCriticalSectionAndSpinCount
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
FlushFileBuffers
CreateFileA
CloseHandle
advapi32
ReadEventLogA
Sections
.text Size: 41KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4.0MB - Virtual size: 4.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 39.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 54KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ