Static task
static1
Behavioral task
behavioral1
Sample
1e4b1ea0fe7c16253169b76c22265b085df9bcca509eb39b8597b54bf53a4920.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
1e4b1ea0fe7c16253169b76c22265b085df9bcca509eb39b8597b54bf53a4920.exe
Resource
win10v2004-20240704-en
General
-
Target
1e4b1ea0fe7c16253169b76c22265b085df9bcca509eb39b8597b54bf53a4920.exe
-
Size
1.8MB
-
MD5
f0669646dcc88adb7268293dcb13dc9e
-
SHA1
8bb62b7ea90e01634e71b2824ca32de8f052d404
-
SHA256
1e4b1ea0fe7c16253169b76c22265b085df9bcca509eb39b8597b54bf53a4920
-
SHA512
0b47c1de2e36a7a57bc84d643f966648ae6d4fa9860802c31c5b9243e772bf2c07461b0c76140bdd6ae4f3ba2e379c9113a368bea34e1ca17fc4bc0a3beb7753
-
SSDEEP
49152:xzjyrrmVmx/meYk+gMZQwRHrFQupgNJtAoFW+Ay9FgAF:xzWTZ+jQSeNJtAowy9FgQ
Malware Config
Signatures
Files
-
1e4b1ea0fe7c16253169b76c22265b085df9bcca509eb39b8597b54bf53a4920.exe.exe windows:5 windows x86 arch:x86
94f4081d3f3457127565d33ec8d950d8
Code Sign
03:12:1a:d7:f1:1e:5b:34:9f:1e:dd:68:5e:61:56:54:41:f9Certificate
IssuerCN=R3,O=Let's Encrypt,C=USNot Before06/11/2022, 20:23Not After04/02/2023, 20:23SubjectCN=*.coachbuild.com7b:05:b1:d4:49:68:51:44:f7:c9:89:d2:9c:19:9d:12Certificate
IssuerCN=VeriSign Universal Root Certification Authority,OU=VeriSign Trust Network+OU=(c) 2008 VeriSign\, Inc. - For authorized use only,O=VeriSign\, Inc.,C=USNot Before12/01/2016, 00:00Not After11/01/2031, 23:59SubjectCN=Symantec SHA256 TimeStamping CA,OU=Symantec Trust Network,O=Symantec Corporation,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
7b:d4:e5:af:ba:cc:07:3f:a1:01:23:04:22:41:4d:12Certificate
IssuerCN=Symantec SHA256 TimeStamping CA,OU=Symantec Trust Network,O=Symantec Corporation,C=USNot Before23/12/2017, 00:00Not After22/03/2029, 23:59SubjectCN=Symantec SHA256 TimeStamping Signer - G3,OU=Symantec Trust Network,O=Symantec Corporation,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
a4:cb:11:7e:ff:f3:8d:aa:f9:68:55:e0:c2:80:9d:95:78:dd:94:a9:63:65:1c:fe:e3:d6:c9:9e:7e:44:e0:3eSigner
Actual PE Digesta4:cb:11:7e:ff:f3:8d:aa:f9:68:55:e0:c2:80:9d:95:78:dd:94:a9:63:65:1c:fe:e3:d6:c9:9e:7e:44:e0:3eDigest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
C:\jop tisaj\vepine\hejeboci bacalino tami.pdb
Imports
kernel32
HeapAlloc
InterlockedIncrement
OutputDebugStringW
GetTickCount
IsBadReadPtr
GetConsoleCP
LoadLibraryW
Sleep
HeapCreate
GetACP
GetLastError
GetCurrentDirectoryW
TlsGetValue
IsValidCodePage
FoldStringW
SetConsoleTitleW
TlsAlloc
GetCurrentProcessId
MultiByteToWideChar
LCMapStringW
IsProcessorFeaturePresent
HeapReAlloc
HeapSize
WideCharToMultiByte
RtlUnwind
SetLastError
GetCommandLineW
GetOEMCP
GetCPInfo
HeapFree
HeapSetInformation
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetProcAddress
GetModuleHandleW
ExitProcess
DecodePointer
WriteFile
GetStdHandle
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
EncodePointer
TlsSetValue
TlsFree
GetCurrentThreadId
InterlockedDecrement
QueryPerformanceCounter
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
GetStringTypeW
user32
MessageBoxW
GetActiveWindow
EnumDisplayDevicesW
GetDC
GetForegroundWindow
gdi32
GetPixel
ole32
CoInitialize
CoUninitialize
Sections
.text Size: 1.5MB - Virtual size: 1.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 2.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 200KB - Virtual size: 199KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ