Static task
static1
General
-
Target
940af28e105a1b5a6b19c4654ffb0f51fb792df6fba9f2cac1fb058568808ed7
-
Size
4.0MB
-
MD5
c74d6533ab86b0ce2d09b680152a6fba
-
SHA1
b0901b25a0f9ddd16705703ab21187fb691c095b
-
SHA256
940af28e105a1b5a6b19c4654ffb0f51fb792df6fba9f2cac1fb058568808ed7
-
SHA512
48b33df360b184cbda62b48694a08a8b787cb5257cb076240415234d6c1d28d6c3b37b13e6b4f8db8895bb4ee94153e6f249fc8be27958d78ad87681437bb0b0
-
SSDEEP
98304:398ldyHJCKkNqygWPbfGcxP/B/6/r/fjPj9HO1346:3mCpFWTfGigfjPj4X
Malware Config
Signatures
Files
-
940af28e105a1b5a6b19c4654ffb0f51fb792df6fba9f2cac1fb058568808ed7.exe windows x86
4d920e61e10762d01d1cb931958ab96f
Code Sign
6a:e5:5d:e4:c2:da:c8:4d:2a:55:bf:98:16:a6:6a:a3Certificate
IssuerPOSTALCODE=10305Not Before20-09-2022 19:09Not After20-09-2023 19:09SubjectPOSTALCODE=1030558:13:c7:68:6b:2c:2f:f9:55:b0:1d:53:33:b5:d2:f3:07:fe:4c:69:a0:4d:ea:1d:a4:37:06:0d:e4:d8:a2:30Signer
Actual PE Digest58:13:c7:68:6b:2c:2f:f9:55:b0:1d:53:33:b5:d2:f3:07:fe:4c:69:a0:4d:ea:1d:a4:37:06:0d:e4:d8:a2:30Digest Algorithmsha256PE Digest MatchestrueSignature Validations
TrustedfalseVerification
Signing CertificatePOSTALCODE=1030515-09-2022 14:52 Valid: false
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedDecrement
GetSystemTimeAdjustment
VerSetConditionMask
SetLocaleInfoW
FindNextVolumeW
FindNextChangeNotification
CopyFileExW
MoveFileWithProgressW
GetProfileSectionW
VerifyVersionInfoW
LocalFlags
GetProcessPriorityBoost
FindFirstChangeNotificationW
GlobalGetAtomNameA
FindResourceExA
GetComputerNameExW
GetModuleHandleA
GetTempPathW
BuildCommDCBAndTimeoutsA
GetProcAddress
LoadLibraryA
ExitProcess
HeapAlloc
InitializeCriticalSection
EnumSystemLocalesW
DisableThreadLibraryCalls
FileTimeToLocalFileTime
GetProcessShutdownParameters
FindResourceW
GetOverlappedResult
GetPrivateProfileStructW
CreateFiber
EnumDateFormatsA
VirtualUnlock
GetTapeParameters
GetPrivateProfileStructA
GetPrivateProfileIntA
GetAtomNameA
FlushConsoleInputBuffer
SetProcessAffinityMask
GetCPInfoExA
SetThreadContext
lstrlenA
SetConsoleCtrlHandler
GlobalGetAtomNameW
SetInformationJobObject
lstrcpynA
WriteConsoleW
GetBinaryTypeW
GetLastError
SearchPathA
GetCommandLineA
VerifyVersionInfoA
GetCalendarInfoW
GetConsoleTitleA
CreateActCtxW
FormatMessageA
GetModuleHandleW
GetConsoleAliasA
LoadLibraryW
FindActCtxSectionGuid
SetConsoleCursorInfo
UnregisterWait
InterlockedIncrement
GlobalAlloc
GetFileType
SetLastError
SetProcessPriorityBoost
GetMailslotInfo
GetSystemDefaultUILanguage
InterlockedExchange
OpenMutexA
HeapReAlloc
GetStartupInfoA
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapCreate
VirtualFree
HeapFree
VirtualAlloc
SetUnhandledExceptionFilter
Sleep
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
InitializeCriticalSectionAndSpinCount
RtlUnwind
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
HeapSize
user32
CharUpperW
gdi32
SelectObject
Sections
.text Size: 45KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3.9MB - Virtual size: 5.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 34KB - Virtual size: 3.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ