Static task
static1
Behavioral task
behavioral1
Sample
d4e4d56b5574fcc7eb2cb59adc9b1be0370e4fa60bd03f0ef4ed3da256eff756.exe
Resource
win10v2004-20240419-en
General
-
Target
d4e4d56b5574fcc7eb2cb59adc9b1be0370e4fa60bd03f0ef4ed3da256eff756
-
Size
4.1MB
-
MD5
6f3f70e0410d8ec6cf754c1900df1a13
-
SHA1
d7dc5883eb23b2c345960e111a0832e859b06fce
-
SHA256
d4e4d56b5574fcc7eb2cb59adc9b1be0370e4fa60bd03f0ef4ed3da256eff756
-
SHA512
47c0c09a052ed6dd3a21e0ad77670249a574a13b6e1757554a60c5c60c56d5671f7efbaa5fa1d1b1d353db52a425d6792eb239600961058f1b642526335ad9ee
-
SSDEEP
98304:FHZC0cKnlY5E+EpUj1zgbf6fIETP6O5U6kTiRyy:dhnm++EpgzIf6fIEFi6kTiRyy
Malware Config
Signatures
Files
-
d4e4d56b5574fcc7eb2cb59adc9b1be0370e4fa60bd03f0ef4ed3da256eff756.exe windows:5 windows x86 arch:x86
846e3703eabe2e97bf5cd60565d49593
Code Sign
b8:67:f3:9c:9b:75:e9:cc:81:52:ea:0d:63:c6:c5:2bCertificate
IssuerCN=522b0300053323224d0036132e0352222e2216260b17250f343c151c22001a3b0d00,POSTALCODE=10835,ST=0b1c1115005f5c4e130a09061b01101e15030d1400004d071702+ST=0b1c1115494a5c0a405601000f17134502120d431112025a0d5102560055050452040c11020709125303081f0a5b1f1d400c1808040a15195a101d060a1a055b0c0b0a070bNot Before07/05/2024, 23:29Not After07/05/2025, 23:29SubjectCN=522b0300053323224d0036132e0352222e2216260b17250f343c151c22001a3b0d00,POSTALCODE=10835,ST=0b1c1115005f5c4e130a09061b01101e15030d1400004d071702+ST=0b1c1115494a5c0a405601000f17134502120d431112025a0d5102560055050452040c11020709125303081f0a5b1f1d400c1808040a15195a101d060a1a055b0c0b0a070b1e:e4:39:4a:49:45:20:6d:58:61:c2:70:a9:33:c5:11:63:30:57:26:9d:d9:54:5c:fe:03:52:22:4f:d4:db:ddSigner
Actual PE Digest1e:e4:39:4a:49:45:20:6d:58:61:c2:70:a9:33:c5:11:63:30:57:26:9d:d9:54:5c:fe:03:52:22:4f:d4:db:ddDigest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedIncrement
EnumCalendarInfoW
GetCommState
SetDefaultCommConfigW
WaitForSingleObject
SetConsoleScreenBufferSize
FindFirstFileExW
GetModuleHandleW
GetProcessHeap
GetConsoleAliasesLengthA
GetSystemTimes
GlobalAlloc
LoadLibraryW
GetLocaleInfoW
lstrcpynW
IsBadWritePtr
SetCurrentDirectoryA
GetCurrentDirectoryW
SetLastError
GetProcAddress
GetLongPathNameA
BuildCommDCBW
SetFileApisToOEM
LoadLibraryA
WriteConsoleA
OpenJobObjectW
FindAtomA
FreeEnvironmentStringsW
EnumDateFormatsW
GetSystemTime
SetFileAttributesW
HeapAlloc
GetCommandLineA
GetStartupInfoA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapFree
VirtualFree
VirtualAlloc
HeapReAlloc
HeapCreate
Sleep
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
InterlockedDecrement
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
SetFilePointer
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
InitializeCriticalSectionAndSpinCount
RtlUnwind
MultiByteToWideChar
SetStdHandle
GetConsoleOutputCP
WriteConsoleW
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
HeapSize
FlushFileBuffers
ReadFile
CreateFileA
CloseHandle
Sections
.text Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4.0MB - Virtual size: 4.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 38.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 67KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ