Static task
static1
General
-
Target
2015dd4de3abbf6d901083c0a73fb6531c82c0eb21651ac7d33ca1cea4785b33
-
Size
4.2MB
-
MD5
0e536912cc7b34686a40a0e57294ba18
-
SHA1
72d2205eefcbb60a02d7f0c069f6dfaf8107a60d
-
SHA256
2015dd4de3abbf6d901083c0a73fb6531c82c0eb21651ac7d33ca1cea4785b33
-
SHA512
147ef3ddfc3152f119ea47afd417a866399656cb778307f1362281c8601b3af7a3ecc4836a89ba7565b6c0497265868eb4b1039bfa20c2bdc58a5a50a2edd8f7
-
SSDEEP
98304:V3eAq8wc/O1Uxvfpy8Ek7Vs/MgpVv7GLdXx16OoTi:ojg/FRfpyK7VtDXOm
Malware Config
Signatures
Files
-
2015dd4de3abbf6d901083c0a73fb6531c82c0eb21651ac7d33ca1cea4785b33.exe windows x86
4a80c3940763f436348583ca7b3aa024
Code Sign
72:b5:d4:8e:c1:ae:4b:4b:99:25:e8:e8:04:87:6d:96Certificate
IssuerPOSTALCODE=10305Not Before17-09-2022 03:37Not After17-09-2023 03:37SubjectPOSTALCODE=10305bd:09:24:b6:7e:75:44:9c:d9:1c:20:ab:27:ff:bf:b0:65:28:b3:3e:c8:30:d5:87:e2:80:ca:22:c2:ed:9c:5fSigner
Actual PE Digestbd:09:24:b6:7e:75:44:9c:d9:1c:20:ab:27:ff:bf:b0:65:28:b3:3e:c8:30:d5:87:e2:80:ca:22:c2:ed:9c:5fDigest Algorithmsha256PE Digest MatchestrueSignature Validations
TrustedfalseVerification
Signing CertificatePOSTALCODE=1030515-09-2022 14:52 Valid: false
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
FoldStringA
InterlockedCompareExchange
OpenWaitableTimerA
CreateEventW
ReadConsoleInputW
WaitNamedPipeW
CommConfigDialogW
SetSystemTimeAdjustment
SearchPathA
EnumResourceTypesW
GetModuleFileNameA
UpdateResourceA
LoadLibraryW
DeleteFileA
CopyFileW
VirtualAlloc
WriteConsoleOutputCharacterA
GetConsoleAliasesLengthW
PeekConsoleInputW
GlobalGetAtomNameA
GetShortPathNameW
GetPrivateProfileStringW
GetProcAddress
ReleaseActCtx
GetConsoleAliasA
FindFirstChangeNotificationA
WritePrivateProfileStringW
EnumResourceNamesW
LockFile
lstrcpynA
AddAtomW
AllocConsole
GetLongPathNameA
GetProcessHandleCount
GetLastError
GetSystemDefaultLCID
GetSystemDefaultLangID
FindNextFileW
OpenJobObjectA
EnterCriticalSection
FindResourceExA
_hwrite
GlobalUnfix
GetComputerNameA
VerifyVersionInfoW
SetFileShortNameA
GetVolumeNameForVolumeMountPointA
GetFileAttributesExA
SetComputerNameW
GetFileAttributesW
GetVolumePathNameW
LocalAlloc
LoadLibraryA
CreateFileA
CloseHandle
InterlockedIncrement
InterlockedDecrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
RaiseException
RtlUnwind
GetStartupInfoW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
HeapFree
HeapAlloc
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
SetFilePointer
ExitProcess
WriteFile
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapSize
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetLocaleInfoA
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
InitializeCriticalSectionAndSpinCount
ReadFile
SetStdHandle
LCMapStringA
LCMapStringW
FlushFileBuffers
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
user32
ScreenToClient
gdi32
GetCharacterPlacementW
msimg32
AlphaBlend
Sections
.text Size: 97KB - Virtual size: 96KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3.9MB - Virtual size: 3.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 121KB - Virtual size: 4.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ