Static task
static1
Behavioral task
behavioral1
Sample
67a20859e5bbdc1d14e676411102e429e3bef682b98c0482fbd8f531c1ff417c.exe
Resource
win7-20240215-en
General
-
Target
67a20859e5bbdc1d14e676411102e429e3bef682b98c0482fbd8f531c1ff417c
-
Size
4.2MB
-
MD5
665144a3735750d01b271fd052798b50
-
SHA1
5abb144159e75af230c17fb90f71111902410c5e
-
SHA256
67a20859e5bbdc1d14e676411102e429e3bef682b98c0482fbd8f531c1ff417c
-
SHA512
dfd4b0b5d10410f18aa572b280eb7d6b52854d524851079d58094a12331378735e1ef86b5dacea4fbd99bfae83228eb0f3c2decabdc8e8b5b45e2dddf8e86bf1
-
SSDEEP
98304:pVhcdKJHEnZTRTBaBVuUMc61j3OcapEaNTl1+lpR0+O15R7Vs:p4UJknvTs761TOcalb+ziHj7m
Malware Config
Signatures
Files
-
67a20859e5bbdc1d14e676411102e429e3bef682b98c0482fbd8f531c1ff417c.exe windows:5 windows x86 arch:x86
a23f80ebb5180166b721931b00404ab4
Code Sign
4b:09:77:a1:5b:83:42:ff:47:78:82:a1:c1:77:ef:abCertificate
IssuerCN=522036264b3c07530c0910253d36220330152b1b14292e1a512d092b0b3746071333,POSTALCODE=10820,ST=0b1c1115005f5c4e010b00161801040700070818064b0c1a02+ST=0b1c1115494a5c031c0b02081a1750475310151f070b57051217441d47031d1512195d501615110b570d0a17550b1209150a45131d1315075a001044160a055b0c0b0a070bNot Before16/02/2024, 16:03Not After15/02/2025, 16:03SubjectCN=522036264b3c07530c0910253d36220330152b1b14292e1a512d092b0b3746071333,POSTALCODE=10820,ST=0b1c1115005f5c4e010b00161801040700070818064b0c1a02+ST=0b1c1115494a5c031c0b02081a1750475310151f070b57051217441d47031d1512195d501615110b570d0a17550b1209150a45131d1315075a001044160a055b0c0b0a070b9b:38:ad:fd:4a:aa:c5:2b:dd:dd:c1:69:93:51:6d:37:8c:72:64:78:2d:01:59:05:4a:87:54:69:ea:a3:51:48Signer
Actual PE Digest9b:38:ad:fd:4a:aa:c5:2b:dd:dd:c1:69:93:51:6d:37:8c:72:64:78:2d:01:59:05:4a:87:54:69:ea:a3:51:48Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SystemTimeToTzSpecificLocalTime
HeapAlloc
SystemTimeToFileTime
SetEvent
GetTickCount
CreateNamedPipeW
GetConsoleAliasesA
GetConsoleAliasesLengthA
WriteFile
LoadLibraryW
GetLocaleInfoW
AssignProcessToJobObject
ReplaceFileA
FlushFileBuffers
CreateDirectoryA
WriteConsoleOutputCharacterW
SetLastError
lstrcmpiA
GetProcAddress
LoadLibraryA
GetProcessWorkingSetSize
LocalAlloc
AddAtomW
EraseTape
FreeEnvironmentStringsW
VirtualProtect
EnumDateFormatsW
FatalAppExitA
EnumSystemLocalesA
GetLocaleInfoA
GetCurrentDirectoryW
GetComputerNameA
GetUserDefaultLCID
CreateFileW
EncodePointer
DecodePointer
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RaiseException
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetLastError
HeapFree
IsProcessorFeaturePresent
GetModuleHandleW
ExitProcess
GetStdHandle
GetModuleFileNameW
HeapCreate
HeapDestroy
Sleep
HeapSize
EnterCriticalSection
LeaveCriticalSection
GetModuleFileNameA
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
GetCurrentThread
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
SetConsoleCtrlHandler
FreeLibrary
InterlockedExchange
HeapReAlloc
RtlUnwind
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetConsoleCP
GetConsoleMode
LCMapStringW
MultiByteToWideChar
GetStringTypeW
SetFilePointer
CloseHandle
WriteConsoleW
SetStdHandle
IsValidLocale
user32
GetClassLongW
advapi32
AccessCheckByType
ole32
CreateDataAdviseHolder
Sections
.text Size: 4.1MB - Virtual size: 4.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 39.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.mec Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ