Static task
static1
General
-
Target
21e98b2a3bf0a228cd7d728e39c693f6fe7ad2c8dbca1c6c854ddb1681d402ba
-
Size
4.1MB
-
MD5
a4a67fa8d159438d6656419ea214aacc
-
SHA1
5d1330e41d1522ddfb799a8f9567017df8ca97cc
-
SHA256
21e98b2a3bf0a228cd7d728e39c693f6fe7ad2c8dbca1c6c854ddb1681d402ba
-
SHA512
d4d5b42279a4e123602691ad07bd56c2dfb85aa0cbacfde6a43321f135599f484a79849cc6fdf2cbcbd719ae69da9119fe9649bb11d90be0e020ecf8e82f2156
-
SSDEEP
98304:0uWkgoGWcxcCfYoi5f49XtL+qRMBk1/zyty5AnNx9Mf1dxRIALsS:3G3BiStaR2Fb5AnZMf7IA1
Malware Config
Signatures
Files
-
21e98b2a3bf0a228cd7d728e39c693f6fe7ad2c8dbca1c6c854ddb1681d402ba.exe windows x86
75d112a417a21f39fc1b1ceff903e344
Code Sign
40:32:7e:c2:75:03:b6:ea:f5:7d:d4:0e:24:6a:81:b7Certificate
IssuerPOSTALCODE=10305Not Before17/09/2022, 20:51Not After17/09/2023, 20:51SubjectPOSTALCODE=10305e6:b9:11:63:10:a4:9b:0b:84:da:dc:4b:9a:2c:6e:ba:15:7d:6a:f0:bc:76:09:9b:e4:86:ea:19:8b:3d:ed:e2Signer
Actual PE Digeste6:b9:11:63:10:a4:9b:0b:84:da:dc:4b:9a:2c:6e:ba:15:7d:6a:f0:bc:76:09:9b:e4:86:ea:19:8b:3d:ed:e2Digest Algorithmsha256PE Digest MatchestrueSignature Validations
TrustedfalseVerification
Signing CertificatePOSTALCODE=1030515/09/2022, 14:52 Valid: false
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedExchangeAdd
OpenWaitableTimerA
CreateEventW
ReadConsoleInputW
WaitNamedPipeW
CommConfigDialogA
SetSystemTimeAdjustment
FindNextFileA
EnumResourceTypesW
GetModuleFileNameA
UpdateResourceA
LoadLibraryW
DeleteFileA
CopyFileA
VirtualAlloc
WriteConsoleOutputCharacterW
GetConsoleAliasW
PeekConsoleInputW
GlobalGetAtomNameA
GetShortPathNameA
GetPrivateProfileStringW
LocalAlloc
GetProcAddress
GetConsoleAliasA
FindFirstChangeNotificationA
WritePrivateProfileStringW
EnumResourceNamesW
LockFile
CommConfigDialogW
lstrcpynA
AddAtomW
AllocConsole
GetLongPathNameW
GetProcessHandleCount
GetLastError
GetSystemDefaultLCID
GetSystemDefaultLangID
OpenJobObjectW
EnterCriticalSection
FindResourceExA
_hwrite
GlobalWire
GetComputerNameA
GetVersionExA
SetFileShortNameA
GetVolumeNameForVolumeMountPointA
GetFileSizeEx
GetFileAttributesExA
SetComputerNameW
GetFileAttributesW
GetVolumePathNameA
FoldStringW
GetModuleHandleA
ReleaseActCtx
LoadLibraryA
CreateFileA
CloseHandle
RtlUnwind
MultiByteToWideChar
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
HeapFree
LeaveCriticalSection
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
SetFilePointer
Sleep
ExitProcess
WriteFile
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapAlloc
HeapReAlloc
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
InitializeCriticalSectionAndSpinCount
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
ReadFile
SetStdHandle
FlushFileBuffers
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
HeapSize
user32
ScreenToClient
gdi32
GetCharacterPlacementW
advapi32
CloseEventLog
msimg32
AlphaBlend
Sections
.text Size: 89KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3.9MB - Virtual size: 3.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 121KB - Virtual size: 4.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ