Static task
static1
Behavioral task
behavioral1
Sample
78517dc331635d17524ae82c1b5f563b5f9d9d09f8b06290e2c190fe9b0e6a94.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
78517dc331635d17524ae82c1b5f563b5f9d9d09f8b06290e2c190fe9b0e6a94.exe
Resource
win10v2004-20240802-en
General
-
Target
53eab0246bb5a153faf8bcdf1c1e72a7.zip
-
Size
69KB
-
MD5
e2ce88d00564d3507cda8fb677c0d6f1
-
SHA1
7bee95b7d6dd2ba04ddb770795d64fa241b7ccd5
-
SHA256
357d02ebe4e268e08e5dbc86d850dcce998a06bc94bd74f791ac6986b59768f9
-
SHA512
545b9e68b9015668e4febec0f1d60b91ffe3fa51124805b31672c374e9c71b8dd0532832e6a832b99071ce9f62f148a74f0479cfecfe5f9d092117cb784d71bf
-
SSDEEP
1536:o7yZMBkX5l91+RsNGqfvpItWyClOvrRAA2BGl75eI9vlgmYW0RY6iit4BmX8n:KmgE5l/FfvYWcrQW75e0vlGW0hiit4BJ
Malware Config
Signatures
Files
-
53eab0246bb5a153faf8bcdf1c1e72a7.zip.zip
Password: infected
-
78517dc331635d17524ae82c1b5f563b5f9d9d09f8b06290e2c190fe9b0e6a94.exe windows:5 windows x86 arch:x86
Password: infected
b46d517100b91c56fb8bc63adef2ce99
Code Sign
38:38:4f:2f:de:a7:f0:bf:43:3f:65:10:5b:1f:f5:93Certificate
IssuerCN=EverestOneLab,1.2.840.113549.1.9.1=#0c12696e666f406576657265737430312e6c6162Not Before12/01/2017, 21:00Not After11/01/2018, 21:00SubjectCN=EverestOneLab,1.2.840.113549.1.9.1=#0c12696e666f406576657265737430312e6c616216:88:f0:39:25:5e:63:8e:69:14:39:07:e6:33:0bCertificate
IssuerCN=UTN-USERFirst-Object,OU=http://www.usertrust.com,O=The USERTRUST Network,L=Salt Lake City,ST=UT,C=USNot Before31/12/2015, 00:00Not After09/07/2019, 18:40SubjectCN=COMODO SHA-1 Time Stamping Signer,O=COMODO CA Limited,L=Salford,ST=Greater Manchester,C=GBExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
Signer
Actual PE DigestDigest AlgorithmPE Digest MatchesfalseHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetFilePointerEx
WideCharToMultiByte
GetProcessHeap
DeleteCriticalSection
HeapDestroy
DecodePointer
HeapAlloc
RaiseException
HeapReAlloc
GetLastError
HeapSize
InitializeCriticalSectionAndSpinCount
WriteConsoleW
HeapFree
IsDebuggerPresent
OutputDebugStringW
EnterCriticalSection
LeaveCriticalSection
CloseHandle
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
GetModuleHandleW
GetProcAddress
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
SetLastError
RtlUnwind
ExitProcess
GetModuleHandleExW
GetModuleFileNameA
MultiByteToWideChar
GetStdHandle
WriteFile
GetCommandLineA
GetCommandLineW
GetACP
GetFileType
CompareStringW
LCMapStringW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetStdHandle
FindClose
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetOEMCP
GetCPInfo
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
GetStringTypeW
CreateFileW
advapi32
RegOpenKeyExW
RegQueryValueExW
Sections
.text Size: 82KB - Virtual size: 81KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 35KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 284B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ