Static task
static1
Behavioral task
behavioral1
Sample
44ef447e66704e8bdb31ebe1613a3e677007e1ecaeda3b2616d0beb444e83309.exe
Resource
win10v2004-20240419-en
General
-
Target
44ef447e66704e8bdb31ebe1613a3e677007e1ecaeda3b2616d0beb444e83309
-
Size
4.1MB
-
MD5
27ff546f2b1a883766a33f1a144fba32
-
SHA1
2a46d4a9984b7619dd28e67fac4e2ff6ae59b951
-
SHA256
44ef447e66704e8bdb31ebe1613a3e677007e1ecaeda3b2616d0beb444e83309
-
SHA512
5b5b129a6227ba91c5dc8d50c648b21c3a2a152f8d188675bf95efcb0e19c249b724b5b281626c4a1c3f4a8a0d5fe3a9a88f374ed36dbb22589de055ec1e142b
-
SSDEEP
98304:8ve2gKGjUNMU4dqdjKiuTfF8gkp3nW8rMtDqtkNHFhqY:8e/BPUo4KiuTN8gksZtDqyN6Y
Malware Config
Signatures
Files
-
44ef447e66704e8bdb31ebe1613a3e677007e1ecaeda3b2616d0beb444e83309.exe windows:5 windows x86 arch:x86
1679b6408c5d33ed187bba0fb99e14e0
Code Sign
8d:3f:d2:14:b0:4c:c1:fe:53:8c:16:ed:9a:7e:3f:8cCertificate
IssuerCN=525d0b323423120e110456060e332e32311412140236333d57310b361108382b0633,POSTALCODE=10835,ST=0b1c1115005f5c4e181a03021b111003011215104d0a110f+ST=0b1c1115494a5c0c14061615180a130112020714120f145c5107110011530255570b5e0b52161c1c1217060c175f1703011717030c091c0e19041d15170a055b0c0b0a070bNot Before29/04/2024, 16:01Not After29/04/2025, 16:01SubjectCN=525d0b323423120e110456060e332e32311412140236333d57310b361108382b0633,POSTALCODE=10835,ST=0b1c1115005f5c4e181a03021b111003011215104d0a110f+ST=0b1c1115494a5c0c14061615180a130112020714120f145c5107110011530255570b5e0b52161c1c1217060c175f1703011717030c091c0e19041d15170a055b0c0b0a070be4:4f:54:73:68:42:06:10:35:3f:b0:60:3c:7c:8d:52:ee:a3:2e:54:fd:aa:95:0a:28:61:16:27:4b:3e:af:3dSigner
Actual PE Digeste4:4f:54:73:68:42:06:10:35:3f:b0:60:3c:7c:8d:52:ee:a3:2e:54:fd:aa:95:0a:28:61:16:27:4b:3e:af:3dDigest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcessHeap
GetConsoleAliasesLengthA
ReadConsoleW
GetDateFormatA
SetCommState
GetSystemTimes
GetVolumeInformationA
GetLocaleInfoW
IsBadCodePtr
lstrcpynW
GetModuleFileNameW
SetCurrentDirectoryA
FindFirstFileExA
GetModuleHandleW
GetProcAddress
SetFileAttributesA
SetFileApisToOEM
LoadLibraryA
LocalAlloc
SetConsoleCtrlHandler
SetConsoleDisplayMode
SetConsoleTitleW
FreeEnvironmentStringsW
BuildCommDCBA
FindAtomW
GetCurrentDirectoryW
EnumCalendarInfoA
GetLastError
HeapReAlloc
HeapAlloc
GetCommandLineA
GetStartupInfoA
RaiseException
RtlUnwind
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapCreate
VirtualFree
VirtualAlloc
Sleep
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
SetFilePointer
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
InitializeCriticalSectionAndSpinCount
HeapSize
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
CreateFileA
CloseHandle
FlushFileBuffers
user32
GetProcessDefaultLayout
advapi32
ReadEventLogA
Sections
.text Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4.0MB - Virtual size: 4.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 38.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ