Static task
static1
Behavioral task
behavioral1
Sample
b1c04c3c5a6d2840746f91380c028ea0N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
b1c04c3c5a6d2840746f91380c028ea0N.exe
Resource
win10v2004-20240709-en
General
-
Target
b1c04c3c5a6d2840746f91380c028ea0N.exe
-
Size
248KB
-
MD5
b1c04c3c5a6d2840746f91380c028ea0
-
SHA1
b1c762af0199424bf678cc6a55847e68d55b7a50
-
SHA256
2613c1752239a8dc6c14ec28b602fafb9f19ca6181481737d250b0a11298260c
-
SHA512
2eb47511bd68545b4e716374c350f1cf1c275f1535910bce197139cf2c0c613f815ecb9c2a78bfd2d1bcf16875104b8d71d299b50587742756e6f86fd471065e
-
SSDEEP
6144:ik1eNshhrZahVbNzD3kXVqpV+x9YpY9Fq4f5jgGx5:ik9ZahVm0pseoxjB
Malware Config
Signatures
Files
-
b1c04c3c5a6d2840746f91380c028ea0N.exe.exe windows:4 windows x86 arch:x86
e3d6498467eb01cfd1939a8c963aa374
Code Sign
70:ba:e4:1d:10:d9:29:34:b6:38:ca:7b:03:cc:ba:bfCertificate
IssuerOU=Class 3 Public Primary Certification Authority,O=VeriSign\, Inc.,C=USNot Before29/01/1996, 00:00Not After01/08/2028, 23:59SubjectOU=Class 3 Public Primary Certification Authority,O=VeriSign\, Inc.,C=US38:25:d7:fa:f8:61:af:9e:f4:90:e7:26:b5:d6:5a:d5Certificate
IssuerCN=VeriSign Time Stamping Services CA,O=VeriSign\, Inc.,C=USNot Before15/06/2007, 00:00Not After14/06/2012, 23:59SubjectCN=VeriSign Time Stamping Services Signer - G2,O=VeriSign\, Inc.,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
47:bf:19:95:df:8d:52:46:43:f7:db:6d:48:0d:31:a4Certificate
IssuerCN=Thawte Timestamping CA,OU=Thawte Certification,O=Thawte,L=Durbanville,ST=Western Cape,C=ZANot Before04/12/2003, 00:00Not After03/12/2013, 23:59SubjectCN=VeriSign Time Stamping Services CA,O=VeriSign\, Inc.,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
1c:2d:d6:1a:35:e6:5d:f6:29:97:01:ff:9b:e5:ca:44Certificate
IssuerCN=VeriSign Class 3 Code Signing 2009-2 CA,OU=VeriSign Trust Network+OU=Terms of use at https://www.verisign.com/rpa (c)09,O=VeriSign\, Inc.,C=USNot Before20/01/2010, 00:00Not After24/01/2012, 23:59SubjectCN=BITDEFENDER LLC,OU=Digital ID Class 3 - Microsoft Software Validation v2,O=BITDEFENDER LLC,L=Fort Lauderdale,ST=Florida,C=USExtended Key Usages
ExtKeyUsageCodeSigning
Key Usages
KeyUsageDigitalSignature
65:52:26:e1:b2:2e:18:e1:59:0f:29:85:ac:22:e7:5cCertificate
IssuerOU=Class 3 Public Primary Certification Authority,O=VeriSign\, Inc.,C=USNot Before21/05/2009, 00:00Not After20/05/2019, 23:59SubjectCN=VeriSign Class 3 Code Signing 2009-2 CA,OU=VeriSign Trust Network+OU=Terms of use at https://www.verisign.com/rpa (c)09,O=VeriSign\, Inc.,C=USExtended Key Usages
ExtKeyUsageClientAuth
ExtKeyUsageCodeSigning
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
59:3a:77:f9:74:03:d5:80:dc:56:9d:55:50:4b:d5:71:c7:07:b3:f1Signer
Actual PE Digest59:3a:77:f9:74:03:d5:80:dc:56:9d:55:50:4b:d5:71:c7:07:b3:f1Digest Algorithmsha1PE Digest MatchesfalseHeaders
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
IsBadWritePtr
VirtualAlloc
CreateNamedPipeW
GetUserDefaultLangID
GetProcessHeap
GetThreadLocale
GetTempFileNameA
OpenSemaphoreA
lstrcmpiW
GetEnvironmentVariableW
CreateThread
GetFullPathNameA
CopyFileExW
EnumTimeFormatsW
IsBadReadPtr
OpenWaitableTimerW
GetEnvironmentStringsA
WaitForSingleObject
DisconnectNamedPipe
GetDiskFreeSpaceA
FatalAppExitW
GetWindowsDirectoryA
EnumDateFormatsW
EnumDateFormatsA
CopyFileExA
GetTempPathW
GetVersionExA
GetSystemDefaultLangID
GetVersion
FindAtomW
GetEnvironmentVariableA
GetFileType
ExpandEnvironmentStringsW
AddAtomA
LocalAlloc
ReplaceFileA
GetProcessHeaps
CreateFileMappingA
GetSystemTime
lstrcpynW
LocalFree
lstrcatW
ExitProcess
GetNumberFormatW
CreateEventA
DeleteAtom
FreeLibrary
IsValidCodePage
MulDiv
EnumCalendarInfoA
user32
ArrangeIconicWindows
CheckDlgButton
SetWindowTextA
GetMenuStringW
CloseWindow
LoadMenuIndirectW
GetForegroundWindow
GetClassInfoExW
GetWindowLongA
CallWindowProcW
GetDC
SetCursor
IsMenu
wsprintfA
SetWindowPos
CheckMenuRadioItem
SetForegroundWindow
MessageBeep
RegisterClassW
SetCapture
TrackPopupMenu
LoadCursorW
GetDlgItemTextA
GetMessageA
AppendMenuA
IsWindow
LoadCursorA
CreateDialogIndirectParamW
LoadIconA
DefDlgProcA
InsertMenuW
GetClassInfoW
CallWindowProcA
GetClassInfoExA
SetWindowLongW
IsChild
GetMenuItemID
wvsprintfW
GetDC
CopyIcon
GetAsyncKeyState
GetCursorPos
CreateWindowExW
DestroyMenu
GetDlgItemTextW
wsprintfW
gdi32
GetGraphicsMode
SetMapperFlags
SelectClipRgn
GetPolyFillMode
UpdateColors
SetBitmapDimensionEx
EndPath
CreateBrushIndirect
GdiGetBatchLimit
StrokeAndFillPath
Arc
SetColorSpace
SetArcDirection
SetViewportExtEx
GetMetaFileA
CreateCompatibleDC
DeleteMetaFile
advapi32
RegOpenKeyA
RegDeleteValueW
RegQueryInfoKeyA
RegReplaceKeyA
ConvertSidToStringSidW
RegOpenKeyExA
shell32
SHGetDiskFreeSpaceExA
StrCmpNIA
StrStrIW
ExtractIconExA
StrStrW
DuplicateIcon
comdlg32
PrintDlgExW
ReplaceTextW
PrintDlgExA
ChooseFontA
urlmon
HlinkGoBack
crypt32
CryptMsgOpenToDecode
Sections
.dIjpP Size: 10KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.GMd Size: 1KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pUltCa Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.yN Size: 1024B - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.WKF Size: 1024B - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.X Size: 1024B - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.PD Size: 4KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.Y Size: 512B - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 213KB - Virtual size: 213KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.mor Size: 2KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ