Static task
static1
Behavioral task
behavioral1
Sample
a3ef9aa49c6861ef3689b69e0e57e6aed6b73fc3bda6d2da1095c36057af2cbf.exe
Resource
win7-20240215-en
General
-
Target
a3ef9aa49c6861ef3689b69e0e57e6aed6b73fc3bda6d2da1095c36057af2cbf
-
Size
4.1MB
-
MD5
c12bc2ace5061f49579d9b85b819f693
-
SHA1
b9a3d788816d0595974ac54a3bacf41ee8141f69
-
SHA256
a3ef9aa49c6861ef3689b69e0e57e6aed6b73fc3bda6d2da1095c36057af2cbf
-
SHA512
dafe56b82eff30e3c1b81adde07f66b3be9299dc6d2660ac009a9f1b377646420857fdc38c788ac238aa1381affc438805137730f3526875086c4054d970f2aa
-
SSDEEP
98304:wL3qvPQpdwFSRzutOtVgrtE3GtiyAu5Gxks:wm3Q3+2AOtVStECE4GWs
Malware Config
Signatures
Files
-
a3ef9aa49c6861ef3689b69e0e57e6aed6b73fc3bda6d2da1095c36057af2cbf.exe windows:5 windows x86 arch:x86
939f5e2d976da555603fc0b02fa5f54e
Code Sign
c8:ab:1e:88:a0:f6:bd:e3:f6:41:a6:27:45:51:0d:b8Certificate
IssuerCN=522b0300053323224d0036132e0352222e2216260b17250f343c151c22001a3b0d00,POSTALCODE=10823,ST=0b1c1115005f5c4e130a09061b01101e15030d1400004d071702+ST=0b1c1115494a5c0a405601000f17134502120d431112025a0d5102560055050452040c11020709125303081f0a5b1f1d400c1808040a15195a101d060a1a055b0c0b0a070bNot Before29-02-2024 00:54Not After28-02-2025 00:54SubjectCN=522b0300053323224d0036132e0352222e2216260b17250f343c151c22001a3b0d00,POSTALCODE=10823,ST=0b1c1115005f5c4e130a09061b01101e15030d1400004d071702+ST=0b1c1115494a5c0a405601000f17134502120d431112025a0d5102560055050452040c11020709125303081f0a5b1f1d400c1808040a15195a101d060a1a055b0c0b0a070b81:45:95:c6:25:5b:d7:ed:80:79:13:ea:1f:f4:1c:52:44:0e:4c:86:24:5a:42:ed:b3:d5:cb:96:42:83:2b:3cSigner
Actual PE Digest81:45:95:c6:25:5b:d7:ed:80:79:13:ea:1f:f4:1c:52:44:0e:4c:86:24:5a:42:ed:b3:d5:cb:96:42:83:2b:3cDigest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SystemTimeToTzSpecificLocalTime
HeapAlloc
GetUserDefaultLCID
WideCharToMultiByte
LoadLibraryW
GetConsoleAliasExesLengthW
GetTimeZoneInformation
ReleaseSemaphore
ReplaceFileA
GetStdHandle
GetCurrentDirectoryW
SetLastError
CreateNamedPipeA
BuildCommDCBW
LoadLibraryA
InterlockedExchangeAdd
MoveFileExA
AddAtomW
GetModuleFileNameA
lstrcatW
FreeEnvironmentStringsW
VirtualProtect
FatalAppExitA
EndUpdateResourceA
FileTimeToLocalFileTime
DeleteTimerQueueTimer
GetVolumeInformationW
CreateFileW
WriteConsoleW
ReadFile
WriteConsoleOutputCharacterW
GetLocaleInfoA
LocalAlloc
GetFileSize
GetProcessHeap
SetEndOfFile
GetLastError
HeapFree
EncodePointer
DecodePointer
GetCommandLineW
HeapSetInformation
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapCreate
Sleep
HeapSize
GetProcAddress
GetModuleHandleW
ExitProcess
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
RtlUnwind
WriteFile
GetModuleFileNameW
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
CloseHandle
CreateFileA
IsProcessorFeaturePresent
GetConsoleCP
GetConsoleMode
FlushFileBuffers
LCMapStringW
MultiByteToWideChar
GetStringTypeW
SetFilePointer
SetStdHandle
RaiseException
user32
SetActiveWindow
SetKeyboardState
CreateIcon
GetClassLongA
gdi32
GetCharWidthW
advapi32
GetAce
ole32
CoTaskMemFree
Sections
.text Size: 4.0MB - Virtual size: 4.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 30.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ