Static task
static1
General
-
Target
Protection_ID.eXe
-
Size
1.2MB
-
MD5
ce07e32f2e9b56d8c60ef9f4ada9e352
-
SHA1
c93d7ad67cdc12de424c3918d16919be9e1eb13a
-
SHA256
26c54eb376183d508ee129531728f9e01d30f0df29d7621f390e8f0ea6a1c79c
-
SHA512
bbb362e4c4128cf635d48f0e3f98afe3ef62b60256571d9a08b623dd07e242e151ede7334c1c3550e70527222920d2e2d05415734f60ac8964eb8f1c9be040e9
-
SSDEEP
24576:o8Acuv/unaHvuf94rgZ8mPdevKwTsXt+/kcV+cLug0doU0CAMX4gN:mxv/FHvufaCP81TsXt+/NNUdoIA8P
Malware Config
Signatures
Files
-
Protection_ID.eXe.exe windows:4 windows x86 arch:x86
ed4b65132f44b56562f4a64fb52c3786
Code Sign
71:ca:bc:22:cd:98:1a:a2:43:5d:40:c9:2a:72:63:8dCertificate
IssuerCN=ProtectionID Team,OU=ProtectionID Team,1.2.840.113549.1.9.1=#0c1c70726f74656374696f6e69647465616d406f75746c6f6f6b2e636f6dNot Before06/01/2013, 01:36Not After31/12/2039, 23:59SubjectCN=ProtectionID Team,OU=ProtectionID Team,1.2.840.113549.1.9.1=#0c1c70726f74656374696f6e69647465616d406f75746c6f6f6b2e636f6d7e:93:eb:fb:7c:c6:4e:59:ea:4b:9a:77:d4:06:fc:3bCertificate
IssuerCN=Thawte Timestamping CA,OU=Thawte Certification,O=Thawte,L=Durbanville,ST=Western Cape,C=ZANot Before21/12/2012, 00:00Not After30/12/2020, 23:59SubjectCN=Symantec Time Stamping Services CA - G2,O=Symantec Corporation,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
0e:cf:f4:38:c8:fe:bf:35:6e:04:d8:6a:98:1b:1a:50Certificate
IssuerCN=Symantec Time Stamping Services CA - G2,O=Symantec Corporation,C=USNot Before18/10/2012, 00:00Not After29/12/2020, 23:59SubjectCN=Symantec Time Stamping Services Signer - G4,O=Symantec Corporation,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
bf:8a:24:72:e3:6d:d6:6d:29:d8:00:44:84:5f:b0:3f:2b:31:b2:00Signer
Actual PE Digestbf:8a:24:72:e3:6d:d6:6d:29:d8:00:44:84:5f:b0:3f:2b:31:b2:00Digest Algorithmsha1PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
d:\ProtectionID.Source\Protection_ID.eXe.pdb
Imports
kernel32
InterlockedIncrement
IsBadReadPtr
LeaveCriticalSection
LoadLibraryA
LoadLibraryExA
LocalAlloc
LocalFree
MapViewOfFile
MulDiv
MultiByteToWideChar
OpenEventA
OpenProcess
QueryDosDeviceA
ReadFile
RemoveDirectoryA
ResetEvent
SetErrorMode
SetEvent
SetFileAttributesA
SetFilePointer
GetEnvironmentStringsW
InterlockedDecrement
SetPriorityClass
SetThreadAffinityMask
SetThreadPriority
SetUnhandledExceptionFilter
Sleep
TerminateProcess
UnmapViewOfFile
VirtualAlloc
VirtualFree
VirtualProtect
VirtualQuery
WaitForSingleObject
WideCharToMultiByte
WriteFile
lstrcatA
lstrcmpiA
lstrcmpiW
lstrlenA
GetEnvironmentStringsA
GetDriveTypeA
InitializeCriticalSection
GlobalUnlock
GlobalMemoryStatus
GlobalLock
GlobalFree
GlobalAlloc
GetWindowsDirectoryW
GetWindowsDirectoryA
GetVolumeInformationA
GetVersionExA
GetVersion
GetTickCount
GetTempPathW
GetTempPathA
GetTempFileNameW
GetSystemTime
GetSystemPowerStatus
GetSystemInfo
GetSystemDirectoryW
GetSystemDirectoryA
GetStartupInfoW
GetStartupInfoA
GetProcessAffinityMask
GetProcAddress
GetPriorityClass
GetModuleHandleA
GetModuleFileNameA
GetLogicalDriveStringsA
GetLocalTime
GetLastError
GetFileTime
GetFileSize
GetFileAttributesW
GetFileAttributesA
GetExitCodeProcess
SetLastError
GetEnvironmentVariableA
GetDiskFreeSpaceA
GetCurrentThreadId
GetCurrentThread
GetCurrentProcessId
GetCurrentProcess
GetCurrentDirectoryA
GetComputerNameA
GetCommandLineA
FreeLibrary
FreeEnvironmentStringsW
FreeEnvironmentStringsA
FormatMessageA
FlushInstructionCache
FlushFileBuffers
FindNextFileA
FindNextChangeNotification
FindFirstFileA
FindFirstChangeNotificationW
FindFirstChangeNotificationA
FindCloseChangeNotification
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
ExitThread
ExitProcess
EnterCriticalSection
DeviceIoControl
DeleteFileW
DeleteFileA
CreateThread
CreateProcessW
CreateProcessA
CreateFileW
CreateFileMappingA
CreateFileA
CreateEventA
CreateDirectoryA
SetFileTime
CloseHandle
user32
SetCursor
SetDlgItemInt
SetDlgItemTextA
SetFocus
SetForegroundWindow
SetMenuDefaultItem
SetMenuItemInfoA
SetTimer
SetWindowLongA
SetWindowPos
SetWindowTextA
ShowWindow
SystemParametersInfoA
TrackPopupMenu
UpdateWindow
WindowFromPoint
wsprintfA
RegisterClassExA
RedrawWindow
PtInRect
PostQuitMessage
PostMessageA
OpenClipboard
MoveWindow
MessageBoxA
LockWindowUpdate
LoadImageA
LoadIconA
SetClipboardData
LoadBitmapA
IsWindowVisible
IsWindowUnicode
IsWindowEnabled
IsWindow
IsDlgButtonChecked
IsClipboardFormatAvailable
InvertRect
InvalidateRect
InflateRect
GetWindowThreadProcessId
GetWindowTextA
GetWindowRect
GetWindowLongA
GetWindowDC
GetSystemMetrics
GetSysColorBrush
GetSysColor
GetScrollRange
GetScrollPos
GetParent
GetMenuStringA
GetMenuItemInfoA
GetKeyState
GetFocus
GetDlgItemTextA
GetDlgItem
GetDlgCtrlID
GetDesktopWindow
SetClassLongA
SetCapture
SetActiveWindow
SendMessageW
SendMessageA
ScreenToClient
RemoveMenu
ReleaseDC
ReleaseCapture
LoadCursorA
RegisterWindowMessageA
GetDC
GetCursorPos
GetClientRect
GetClassNameA
FrameRect
FindWindowA
FillRect
EnumDisplaySettingsA
EnumChildWindows
EndPaint
EndDialog
EndDeferWindowPos
EnableWindow
EnableMenuItem
EmptyClipboard
DrawTextA
DrawStateA
DrawFrameControl
DrawFocusRect
DrawEdge
DialogBoxParamA
DestroyWindow
DestroyMenu
DestroyIcon
DeleteMenu
DeferWindowPos
DefWindowProcA
CreateWindowExA
CreatePopupMenu
CreateDialogParamA
CloseClipboard
ClientToScreen
CheckRadioButton
CheckDlgButton
CharLowerBuffA
CallWindowProcA
BeginPaint
AppendMenuA
BeginDeferWindowPos
GetMenuItemCount
comctl32
ord17
ImageList_Remove
ImageList_AddIcon
ImageList_GetIcon
ImageList_Create
ImageList_AddMasked
ImageList_GetImageCount
advapi32
RegDeleteKeyA
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
SetSecurityDescriptorDacl
AccessCheck
AddAccessAllowedAce
AllocateAndInitializeSid
DeleteService
FreeSid
GetLengthSid
GetUserNameA
ImpersonateSelf
InitializeAcl
InitializeSecurityDescriptor
IsValidSecurityDescriptor
OpenProcessToken
OpenThreadToken
RegCloseKey
RegCreateKeyExA
RegDeleteValueA
RegEnumKeyExA
RegEnumKeyExW
RegFlushKey
RegOpenKeyA
RegOpenKeyExA
RegOpenKeyExW
RegQueryInfoKeyA
RegQueryInfoKeyW
RegQueryValueExA
RegQueryValueExW
RevertToSelf
RegSetValueExA
shell32
ShellExecuteW
ShellExecuteA
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHGetFileInfoA
SHBrowseForFolderA
SHAddToRecentDocs
DragQueryFileA
DragFinish
Shell_NotifyIconA
gdi32
DeleteDC
DeleteObject
ExcludeClipRect
GetDeviceCaps
GetObjectA
GetPath
GetPixel
GetStockObject
GetTextExtentPoint32A
CreateSolidBrush
LineTo
MoveToEx
SelectClipRgn
SelectObject
SetBkColor
SetBkMode
SetTextColor
StretchBlt
TextOutA
CreatePen
CreateFontIndirectA
CreateFontA
CreateDIBSection
CreateDCA
CreateCompatibleDC
IntersectClipRect
BitBlt
CreateCompatibleBitmap
comdlg32
GetSaveFileNameA
GetOpenFileNameW
GetOpenFileNameA
FindTextA
ChooseFontA
ChooseColorA
GetSaveFileNameW
ole32
CoTaskMemFree
CoUninitialize
CoInitialize
CoCreateInstance
CoInitializeSecurity
CoInitializeEx
oleaut32
VariantInit
VariantClear
Exports
Exports
report_pid_version
Sections
.text Size: 459KB - Virtual size: 458KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.plugins Size: - Virtual size: 65B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.plgcore Size: - Virtual size: 9KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 332KB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sehnam Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.sehdat Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.ddcccc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.config Size: 512B - Virtual size: 308B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 322KB - Virtual size: 321KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE