Static task
static1
Behavioral task
behavioral1
Sample
715c0b505a9ffe60ac7ca539a5f6fc4414f2e7a0adcdd47442ee325502c3e0c6.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
715c0b505a9ffe60ac7ca539a5f6fc4414f2e7a0adcdd47442ee325502c3e0c6.exe
Resource
win10v2004-20240709-en
General
-
Target
715c0b505a9ffe60ac7ca539a5f6fc4414f2e7a0adcdd47442ee325502c3e0c6.exe
-
Size
16.5MB
-
MD5
0ccca4bebac91c1eef63addacf7064cd
-
SHA1
87956d6f7f3bc7e438f16ed614e3daecb05b1474
-
SHA256
715c0b505a9ffe60ac7ca539a5f6fc4414f2e7a0adcdd47442ee325502c3e0c6
-
SHA512
ad487d6a446615d05937a2199cec2b94b2be6e277b469b7bf678c22031388235834e7c368d5c226e32bc0d36e4b2ffafbb371312446174bce06a62df8b093762
-
SSDEEP
393216:m6w+S2LYe1iUDjofsv7eZyGJMlhA4w/1B+biNgfPk4A4383KxWvrBD:lSU/ktEv7eZyGchrkB+HfKA83KxWvtD
Malware Config
Signatures
Files
-
715c0b505a9ffe60ac7ca539a5f6fc4414f2e7a0adcdd47442ee325502c3e0c6.exe.exe windows:6 windows x64 arch:x64
06398a46ca8e9cc59ac7c9d5cb26c262
Code Sign
21:42:5f:a0:4c:1f:49:05:24:95:e7:62:ba:d0:9f:9b:ae:28:c6:a6Certificate
IssuerCN=Eskia Computers,O=Eskia Computers,L=Penistone,ST=South Yorkshire,C=UK,1.2.840.113549.1.9.1=#0c10696e666f4065736b69612e636f2e756bNot Before28/03/2023, 09:15Not After26/03/2028, 09:15SubjectCN=Eskia Computers,O=Eskia Computers,L=Penistone,ST=South Yorkshire,C=UK,1.2.840.113549.1.9.1=#0c10696e666f4065736b69612e636f2e756b30:0f:6f:ac:dd:66:98:74:7c:a9:46:36:a7:78:2d:b9Certificate
IssuerCN=USERTrust RSA Certification Authority,O=The USERTRUST Network,L=Jersey City,ST=New Jersey,C=USNot Before02/05/2019, 00:00Not After18/01/2038, 23:59SubjectCN=Sectigo RSA Time Stamping CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GBExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageCertSign
KeyUsageCRLSign
90:39:7f:9a:d2:4a:3a:13:f2:bd:91:5f:08:38:a9:43Certificate
IssuerCN=Sectigo RSA Time Stamping CA,O=Sectigo Limited,L=Salford,ST=Greater Manchester,C=GBNot Before11/05/2022, 00:00Not After10/08/2033, 23:59SubjectCN=Sectigo RSA Time Stamping Signer #3,O=Sectigo Limited,ST=Manchester,C=GBExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
7a:32:7c:41:35:e6:60:ff:8d:e2:84:fc:63:48:92:c2:9c:4e:fb:65Signer
Actual PE Digest7a:32:7c:41:35:e6:60:ff:8d:e2:84:fc:63:48:92:c2:9c:4e:fb:65Digest Algorithmsha1PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
advapi32
SystemFunction036
kernel32
HeapFree
GetProcessHeap
HeapAlloc
HeapReAlloc
GetCommandLineW
lstrlenW
AcquireSRWLockExclusive
ReleaseSRWLockExclusive
GetFileInformationByHandleEx
CompareStringOrdinal
GetLastError
CloseHandle
WaitForMultipleObjects
GetOverlappedResult
WaitForSingleObject
GetExitCodeProcess
AddVectoredExceptionHandler
SetThreadStackGuarantee
AcquireSRWLockShared
ReleaseSRWLockShared
GetModuleHandleA
GetProcAddress
GetCurrentThread
TryAcquireSRWLockExclusive
GetStdHandle
GetConsoleMode
WriteConsoleW
SetLastError
WaitForSingleObjectEx
LoadLibraryA
CreateMutexA
GetCurrentProcess
ReleaseMutex
GetEnvironmentVariableW
RtlLookupFunctionEntry
GetModuleHandleW
FormatMessageW
GetModuleFileNameW
CreateFileW
GetFileInformationByHandle
GetFullPathNameW
CreateDirectoryW
FindFirstFileW
FindClose
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetSystemDirectoryW
GetWindowsDirectoryW
CreateProcessW
GetFileAttributesW
DuplicateHandle
GetCurrentProcessId
CreateNamedPipeW
CreateThread
ReadFileEx
SleepEx
WriteFileEx
CreateEventW
CancelIo
ReadFile
GetCurrentDirectoryW
RtlCaptureContext
SetFileInformationByHandle
SwitchToThread
SetFilePointerEx
GetConsoleOutputCP
FlushFileBuffers
HeapSize
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RtlVirtualUnwind
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
RtlUnwindEx
EncodePointer
RaiseException
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
RtlPcToFileHeader
WriteFile
ExitProcess
TerminateProcess
GetModuleHandleExW
GetCommandLineA
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
MultiByteToWideChar
WideCharToMultiByte
SetEnvironmentVariableW
SetStdHandle
GetFileType
GetStringTypeW
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
CompareStringW
LCMapStringW
ole32
CoTaskMemFree
shell32
SHGetKnownFolderPath
bcrypt
BCryptGenRandom
Sections
.text Size: 327KB - Virtual size: 327KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16.1MB - Virtual size: 16.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 244B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ