Static task
static1
Behavioral task
behavioral1
Sample
e3f7e7b2462aef5cf4b2605303bbbe2c8346b8fb83a6a7115c5eff98d5a0909f.exe
Resource
win10v2004-20240508-en
General
-
Target
e3f7e7b2462aef5cf4b2605303bbbe2c8346b8fb83a6a7115c5eff98d5a0909f
-
Size
4.1MB
-
MD5
a8829574672029d975e93ea2659cc9e8
-
SHA1
6bf08d554c754918b3b65a82f63815bdfa21786f
-
SHA256
e3f7e7b2462aef5cf4b2605303bbbe2c8346b8fb83a6a7115c5eff98d5a0909f
-
SHA512
12c729646d4a0f2ce919b26c6d50e7c1b41181fa670ca9e67af72328cc527efdfd3c734c27cf6644734a8918486518758e416cf5755dfa948c983710c3efd852
-
SSDEEP
98304:cFETef+mmkxaPY+QSMo7d4VmoteWoCPtlnvHUEaCydSE:cFGef+mhxag+rMGd4V3tmut57tE
Malware Config
Signatures
Files
-
e3f7e7b2462aef5cf4b2605303bbbe2c8346b8fb83a6a7115c5eff98d5a0909f.exe windows:5 windows x86 arch:x86
c59ebdef002e644678c85e3a8f778696
Code Sign
91:e0:93:da:25:4a:e6:12:4c:0e:d3:68:6d:7b:6e:47Certificate
IssuerCN=525d0b323423120e110456060e332e32311412140236333d57310b361108382b0633,POSTALCODE=10825,ST=0b1c1115005f5c4e181a03021b111003011215104d0a110f+ST=0b1c1115494a5c0c14061615180a130112020714120f145c5107110011530255570b5e0b52161c1c1217060c175f1703011717030c091c0e19041d15170a055b0c0b0a070bNot Before14/05/2024, 00:52Not After14/05/2025, 00:52SubjectCN=525d0b323423120e110456060e332e32311412140236333d57310b361108382b0633,POSTALCODE=10825,ST=0b1c1115005f5c4e181a03021b111003011215104d0a110f+ST=0b1c1115494a5c0c14061615180a130112020714120f145c5107110011530255570b5e0b52161c1c1217060c175f1703011717030c091c0e19041d15170a055b0c0b0a070b3d:32:87:06:d7:49:a0:b8:fd:ef:63:00:15:ed:ee:bb:54:ff:80:ae:48:77:ef:81:92:63:eb:3b:2b:1d:45:f4Signer
Actual PE Digest3d:32:87:06:d7:49:a0:b8:fd:ef:63:00:15:ed:ee:bb:54:ff:80:ae:48:77:ef:81:92:63:eb:3b:2b:1d:45:f4Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedIncrement
EnumCalendarInfoW
SetConsoleScreenBufferSize
FreeEnvironmentStringsA
GetModuleHandleW
IsBadReadPtr
GetSystemTimes
GlobalAlloc
Sleep
lstrcpynW
GetFileAttributesW
WriteConsoleW
CompareStringW
SetCurrentDirectoryA
FindFirstFileExA
GetCurrentDirectoryW
SetLastError
GetProcAddress
GetProcessHeaps
LoadLibraryA
SetConsoleDisplayMode
AddAtomW
FindNextChangeNotification
OpenJobObjectW
FindAtomA
EnumDateFormatsA
SetConsoleTitleW
GetCommTimeouts
BuildCommDCBA
GetSystemTime
AreFileApisANSI
GetLastError
HeapReAlloc
HeapAlloc
ExitProcess
GetCommandLineA
GetStartupInfoA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
HeapCreate
VirtualFree
HeapFree
VirtualAlloc
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
InterlockedDecrement
WriteFile
GetStdHandle
GetModuleFileNameA
InitializeCriticalSectionAndSpinCount
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
SetFilePointer
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
RtlUnwind
MultiByteToWideChar
HeapSize
GetLocaleInfoA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
FlushFileBuffers
ReadFile
CreateFileA
CloseHandle
user32
UpdateWindow
Sections
.text Size: 43KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4.0MB - Virtual size: 4.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 34.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 65KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ