Static task
static1
Behavioral task
behavioral1
Sample
1ce3a75e1ce1c7eab4946398ffa43c8b7bed79dfe6190b86acc5e1cca20e027f.exe
Resource
win10v2004-20240426-en
General
-
Target
1ce3a75e1ce1c7eab4946398ffa43c8b7bed79dfe6190b86acc5e1cca20e027f
-
Size
4.1MB
-
MD5
5564a0102f319e04f6388895dd7c68af
-
SHA1
91c103400e45aaf8ca4c12ba9b299cdaf9db921f
-
SHA256
1ce3a75e1ce1c7eab4946398ffa43c8b7bed79dfe6190b86acc5e1cca20e027f
-
SHA512
b9d4d90a2bbd61a74b06785f0446f305b2733a630315d2b5172f0077f9ab6926ef85a4429ff6d527063b65279c0ff37fbebb2028e558ed8a62db91a9df98d48f
-
SSDEEP
98304:sve2gKGjUNMU4dqdjKiuTfF8gkp3nW8rMtDqtkNHFhqS:Me/BPUo4KiuTN8gksZtDqyN6S
Malware Config
Signatures
Files
-
1ce3a75e1ce1c7eab4946398ffa43c8b7bed79dfe6190b86acc5e1cca20e027f.exe windows:5 windows x86 arch:x86
1679b6408c5d33ed187bba0fb99e14e0
Code Sign
9d:c5:2e:67:46:6a:43:9c:e1:04:4b:d2:28:d1:34:14Certificate
IssuerCN=52201f2f18311d572f560b271a020721531729232121351c16372a14042518241f2d,POSTALCODE=10812,ST=0b1c1115005f5c4e190c06020416111211004f1a1102+ST=0b1c1115494a5c0203141202020e504510065319025209045100410317190c5653150d02501b141f001a0d01060a52121b130a53030f08110d1453190b1a055b0c0b0a070bNot Before29/04/2024, 15:58Not After29/04/2025, 15:58SubjectCN=52201f2f18311d572f560b271a020721531729232121351c16372a14042518241f2d,POSTALCODE=10812,ST=0b1c1115005f5c4e190c06020416111211004f1a1102+ST=0b1c1115494a5c0203141202020e504510065319025209045100410317190c5653150d02501b141f001a0d01060a52121b130a53030f08110d1453190b1a055b0c0b0a070be4:4f:54:73:68:42:06:10:35:3f:b0:60:3c:7c:8d:52:ee:a3:2e:54:fd:aa:95:0a:28:61:16:27:4b:3e:af:3dSigner
Actual PE Digeste4:4f:54:73:68:42:06:10:35:3f:b0:60:3c:7c:8d:52:ee:a3:2e:54:fd:aa:95:0a:28:61:16:27:4b:3e:af:3dDigest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcessHeap
GetConsoleAliasesLengthA
ReadConsoleW
GetDateFormatA
SetCommState
GetSystemTimes
GetVolumeInformationA
GetLocaleInfoW
IsBadCodePtr
lstrcpynW
GetModuleFileNameW
SetCurrentDirectoryA
FindFirstFileExA
GetModuleHandleW
GetProcAddress
SetFileAttributesA
SetFileApisToOEM
LoadLibraryA
LocalAlloc
SetConsoleCtrlHandler
SetConsoleDisplayMode
SetConsoleTitleW
FreeEnvironmentStringsW
BuildCommDCBA
FindAtomW
GetCurrentDirectoryW
EnumCalendarInfoA
GetLastError
HeapReAlloc
HeapAlloc
GetCommandLineA
GetStartupInfoA
RaiseException
RtlUnwind
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapCreate
VirtualFree
VirtualAlloc
Sleep
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
SetFilePointer
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
InitializeCriticalSectionAndSpinCount
HeapSize
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
CreateFileA
CloseHandle
FlushFileBuffers
user32
GetProcessDefaultLayout
advapi32
ReadEventLogA
Sections
.text Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4.0MB - Virtual size: 4.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 38.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ