Static task
static1
Behavioral task
behavioral1
Sample
384a2ae1636541213881f6bcf0c6c6bc81f8081dcc6ae803f2eaad3563d56625.exe
Resource
win10v2004-20240226-en
General
-
Target
384a2ae1636541213881f6bcf0c6c6bc81f8081dcc6ae803f2eaad3563d56625
-
Size
4.2MB
-
MD5
3f3343c89545fedc460427c1cba42f6e
-
SHA1
3d664c1f1853a6fd47d2b46011d8cad3aeee5b9d
-
SHA256
384a2ae1636541213881f6bcf0c6c6bc81f8081dcc6ae803f2eaad3563d56625
-
SHA512
69ab1ec47eef39ac44004afeca8cb3ca774f423cd36b3bb34ddfdd76e9c78753a5997755a37cb893194087512ab145907843de6352132a108fbd3ebbb102e7e1
-
SSDEEP
98304:H5+mIL5L7IQj8yJZZuDoiuzYljTftPavivh2zh/weL:Z+zh739J3uDoioYlH4vmAzhzL
Malware Config
Signatures
Files
-
384a2ae1636541213881f6bcf0c6c6bc81f8081dcc6ae803f2eaad3563d56625.exe windows:5 windows x86 arch:x86
b08f77f16bf9cfb64c788e445e46d3b1
Code Sign
bf:e8:d0:0e:f2:01:a0:4c:61:eb:70:aa:21:c8:2b:57Certificate
IssuerCN=5225102f0434382d242811523e2627225c0650271700133f52163721402002312055,POSTALCODE=10802,ST=0b1c1115005f5c4e110211020a04161610030607020106461710+ST=0b1c1115494a5c041c1150080c17090704050e005006511f0214001f1518010656090d0252450d0309185403131b5207441f1b0d41130a081a5013450802055b0c0b0a070bNot Before22-04-2024 07:35Not After22-04-2025 07:35SubjectCN=5225102f0434382d242811523e2627225c0650271700133f52163721402002312055,POSTALCODE=10802,ST=0b1c1115005f5c4e110211020a04161610030607020106461710+ST=0b1c1115494a5c041c1150080c17090704050e005006511f0214001f1518010656090d0252450d0309185403131b5207441f1b0d41130a081a5013450802055b0c0b0a070bcd:49:78:a1:49:2c:67:24:b3:61:e6:ab:99:4d:be:c6:c6:20:ed:f5:f4:e2:ca:14:87:30:02:74:99:4c:b1:b6Signer
Actual PE Digestcd:49:78:a1:49:2c:67:24:b3:61:e6:ab:99:4d:be:c6:c6:20:ed:f5:f4:e2:ca:14:87:30:02:74:99:4c:b1:b6Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EnumCalendarInfoA
GetLocaleInfoA
SetFirmwareEnvironmentVariableA
GetComputerNameW
UnlockFile
FreeEnvironmentStringsA
GetModuleHandleW
GetConsoleAliasesLengthA
GetDateFormatA
EnumTimeFormatsW
SetCommState
GlobalAlloc
LoadLibraryW
GetConsoleAliasExesLengthW
FindNextVolumeW
IsBadWritePtr
GetModuleFileNameW
GlobalUnfix
SetCurrentDirectoryA
GetProcAddress
GetProcessHeaps
LoadLibraryA
SetCalendarInfoW
GetFileType
SetConsoleDisplayMode
WaitForMultipleObjects
SetConsoleTitleW
BuildCommDCBA
VirtualProtect
GetCurrentDirectoryA
FindAtomW
SetFileAttributesW
GetVolumeInformationW
LocalFileTimeToFileTime
GetCommandLineA
GetStartupInfoA
RaiseException
RtlUnwind
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
GetLastError
HeapFree
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
Sleep
HeapSize
ExitProcess
EnterCriticalSection
LeaveCriticalSection
WriteFile
GetStdHandle
GetModuleFileNameA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
DeleteCriticalSection
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
VirtualAlloc
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
InitializeCriticalSectionAndSpinCount
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
LCMapStringA
LCMapStringW
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetFilePointer
CloseHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
CreateFileA
Sections
.text Size: 41KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4.0MB - Virtual size: 4.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 39.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 54KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ