Static task
static1
General
-
Target
0b6115ac4c1ddfcf850158c103bd4ad8cbb0ce1c2fdd7bd7bfd418202b1ff3cb
-
Size
4.0MB
-
MD5
d1105e6eabd9e66c9b4118141d908229
-
SHA1
2cc13c9d3ae5429a40b67c5f7c9d713a142354dc
-
SHA256
0b6115ac4c1ddfcf850158c103bd4ad8cbb0ce1c2fdd7bd7bfd418202b1ff3cb
-
SHA512
4b13ec3df90377a969c7c8cfd1e89d43483b7b72a3ec7265fa00c521e3944ce432e6df4afe457df8bf0b417b21e7a1579ac913ca1e440cba2e34b10697586f7e
-
SSDEEP
98304:vHv5apQiK0Rdz7yZnGDcsW9mg5G82ECAyiDHRVL5x7BPo:vP5FidRoJGDXWj5GowiDxVNxdPo
Malware Config
Signatures
Files
-
0b6115ac4c1ddfcf850158c103bd4ad8cbb0ce1c2fdd7bd7bfd418202b1ff3cb.exe windows x86
1ca63ddf2599405870f6fd152a904539
Code Sign
71:e5:3d:51:ad:63:c6:94:0f:b0:c5:7c:de:bc:98:4cCertificate
IssuerPOSTALCODE=10305Not Before21-09-2022 04:49Not After21-09-2023 04:49SubjectPOSTALCODE=10305aa:b8:ff:58:ad:40:0f:96:7b:12:70:9d:9a:9e:0b:9f:23:f6:87:47:c7:b4:0b:8d:42:2d:4b:49:48:aa:7b:a5Signer
Actual PE Digestaa:b8:ff:58:ad:40:0f:96:7b:12:70:9d:9a:9e:0b:9f:23:f6:87:47:c7:b4:0b:8d:42:2d:4b:49:48:aa:7b:a5Digest Algorithmsha256PE Digest MatchestrueSignature Validations
TrustedfalseVerification
Signing CertificatePOSTALCODE=1030515-09-2022 14:53 Valid: false
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetSystemTimeAdjustment
VerSetConditionMask
SetLocaleInfoW
FindNextVolumeW
FindNextChangeNotification
CopyFileExW
MoveFileWithProgressW
GetProfileSectionW
VerifyVersionInfoW
LocalFlags
GetProcessPriorityBoost
FindFirstChangeNotificationA
GlobalGetAtomNameA
FindResourceExA
GetComputerNameExW
GetModuleHandleA
GetTempPathW
BuildCommDCBAndTimeoutsA
GetProcAddress
LoadLibraryA
ExitProcess
HeapAlloc
InitializeCriticalSection
EnumSystemLocalesW
DisableThreadLibraryCalls
OpenMutexA
FileTimeToLocalFileTime
GetProcessShutdownParameters
FindResourceW
GetOverlappedResult
DeleteFiber
EnumDateFormatsA
VirtualUnlock
GetCurrencyFormatA
GetTapeParameters
InterlockedDecrement
GetAtomNameA
FlushConsoleInputBuffer
SetProcessAffinityMask
GetCPInfoExW
SetThreadContext
lstrlenA
SetConsoleCtrlHandler
GlobalGetAtomNameW
QueryInformationJobObject
lstrcpynA
WriteConsoleW
GetBinaryTypeW
SearchPathA
GetCommandLineA
VerifyVersionInfoA
GetCalendarInfoW
GetConsoleTitleA
CreateActCtxW
FormatMessageA
GetModuleHandleW
GetConsoleAliasA
InterlockedIncrement
LoadLibraryW
InterlockedExchange
FindActCtxSectionGuid
SetConsoleCursorInfo
UnregisterWait
GlobalAlloc
GetFileType
SetLastError
SetProcessPriorityBoost
GetMailslotInfo
GetSystemDefaultUILanguage
GetPrivateProfileStructW
GetPrivateProfileIntA
GetLastError
HeapReAlloc
GetStartupInfoA
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapCreate
VirtualFree
HeapFree
VirtualAlloc
SetUnhandledExceptionFilter
Sleep
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
InitializeCriticalSectionAndSpinCount
RtlUnwind
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
HeapSize
user32
CharUpperW
gdi32
SelectObject
Sections
.text Size: 45KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3.9MB - Virtual size: 5.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 34KB - Virtual size: 3.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ