Static task
static1
Behavioral task
behavioral1
Sample
5a7b8feb65ff7cfc058c5e7198d5287ed8287ef23f721949bfba41d1cd19467c.exe
Resource
win7-20240221-en
General
-
Target
e13d9ab9096dcc3bd309272dea987462.bin
-
Size
3.5MB
-
MD5
24d365c829ad2170b637da982edcc51a
-
SHA1
6851be4615ababd7a5b8b650b7c652487dc4c45e
-
SHA256
968dc3ca2239393cdc9fb2748e3a3bf9a6e56243fc965bea43b1ddcc2adda280
-
SHA512
158c036dae6cd974ba2bde64c69416f3234f96e94fa5de21ec97ce6404677586c89079fd9a1ce8a3d64e4a233e28eb2aae29212148633168be6f62387eb02f96
-
SSDEEP
98304:n6xukUbpOBG6jPOITGTDEXqnrQhMHzvfzYfhU:k8sBxjr5XqES3zz
Malware Config
Signatures
Files
-
e13d9ab9096dcc3bd309272dea987462.bin.zip
Password: infected
-
5a7b8feb65ff7cfc058c5e7198d5287ed8287ef23f721949bfba41d1cd19467c.exe.exe windows:6 windows x86 arch:x86
Password: infected
fce2185f86316405847dae4f4adccdc7
Code Sign
5e:26:4b:b6:f7:48:a1:a5:41:36:97:9d:5c:99:f1:1cCertificate
IssuerCN=JetBrains s.r.o. ï~�‰E°jï~�‰E°jï~�‰E°jNot Before17/04/2024, 14:34Not After18/04/2034, 14:34SubjectCN=JetBrains s.r.o. ï~�‰E°jï~�‰E°jï~�‰E°j39:4c:25:e1:7c:a0:6d:27:a8:65:e2:3b:d9:1d:22:d4Certificate
IssuerCN=Sectigo RSA Time Stamping CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GBNot Before03/05/2023, 00:00Not After02/08/2034, 23:59SubjectCN=Sectigo RSA Time Stamping Signer #4,O=Sectigo Limited,ST=Manchester,C=GBExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
30:0f:6f:ac:dd:66:98:74:7c:a9:46:36:a7:78:2d:b9Certificate
IssuerCN=USERTrust RSA Certification Authority,O=The USERTRUST Network,L=Jersey City,ST=New Jersey,C=USNot Before02/05/2019, 00:00Not After18/01/2038, 23:59SubjectCN=Sectigo RSA Time Stamping CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GBExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
17:d2:c6:78:d4:41:2d:7c:5d:27:0a:92:2c:9b:fc:09:d2:04:5c:e1:34:33:14:fc:5e:c0:80:6c:56:0b:fd:40Signer
Actual PE Digest17:d2:c6:78:d4:41:2d:7c:5d:27:0a:92:2c:9b:fc:09:d2:04:5c:e1:34:33:14:fc:5e:c0:80:6c:56:0b:fd:40Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVersionExA
GetSystemTimeAsFileTime
HeapAlloc
HeapFree
ExitProcess
GetModuleHandleA
LoadLibraryA
GetProcAddress
user32
wsprintfA
gdi32
CreateCompatibleBitmap
advapi32
RegQueryValueExA
shell32
ShellExecuteA
ole32
CoInitialize
ws2_32
WSAStartup
crypt32
CryptUnprotectData
shlwapi
PathFindExtensionA
gdiplus
GdipGetImageEncoders
setupapi
SetupDiEnumDeviceInfo
ntdll
RtlUnicodeStringToAnsiString
rstrtmgr
RmStartSession
Sections
.text Size: - Virtual size: 1.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 158KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp,,,0 Size: - Virtual size: 2.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vmp,,,1 Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vmp,,,2 Size: 3.5MB - Virtual size: 3.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 802B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ