Static task
static1
General
-
Target
9484d586c33b3979da18dc26cf169051897a87a1388471435ceac6d88224b87f
-
Size
4.0MB
-
MD5
519fe2f1cee0db767e9867639ee9bda4
-
SHA1
3f54fa972adf0caea22de1a6c3a9dcd39f5dde2a
-
SHA256
9484d586c33b3979da18dc26cf169051897a87a1388471435ceac6d88224b87f
-
SHA512
aa71dc8a7477c6c778f8df57ab38c797e5a2a3b2776a5885a2b836b64da5b4f4b7d425263e4339d6acebd45b5ac72c8185eed44af0d8bce09594ce6eda697e08
-
SSDEEP
98304:kKZS0QGvv4foHCZsF2TV6nPpnSzmHPVch/rYd6hH8VhxJD:9ZXQBf0CaFFIsPK5cd6d8VhxJD
Malware Config
Signatures
Files
-
9484d586c33b3979da18dc26cf169051897a87a1388471435ceac6d88224b87f.exe windows x86
2d5ec24fb9d2ee4cf8208f9e16125d4f
Code Sign
18:4a:18:03:92:ac:16:a3:62:2b:75:01:20:8c:e9:02Certificate
IssuerPOSTALCODE=10305Not Before03-10-2022 13:35Not After03-10-2023 13:35SubjectPOSTALCODE=103052b:0f:a1:36:06:3a:fe:22:b8:80:e5:61:4f:6d:65:ca:83:03:41:9c:de:5b:7c:aa:ef:6c:d4:c8:89:10:5a:a4Signer
Actual PE Digest2b:0f:a1:36:06:3a:fe:22:b8:80:e5:61:4f:6d:65:ca:83:03:41:9c:de:5b:7c:aa:ef:6c:d4:c8:89:10:5a:a4Digest Algorithmsha256PE Digest MatchestrueSignature Validations
TrustedfalseVerification
Signing CertificatePOSTALCODE=1030503-10-2022 12:53 Valid: false
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
InterlockedPushEntrySList
GetConsoleAliasesW
ReadFile
ReadConsoleW
GetVolumeInformationA
GetComputerNameA
LocalFree
InterlockedDecrement
SetSystemTimeAdjustment
SetLocaleInfoA
FindNextVolumeA
FindCloseChangeNotification
CopyFileExA
MoveFileWithProgressW
VerifyVersionInfoW
LocalSize
FileTimeToDosDateTime
DebugBreak
GlobalGetAtomNameW
IsBadWritePtr
FindResourceA
GetComputerNameExW
GetProcAddress
GetStringTypeW
GetFileTime
GetConsoleAliasesLengthW
GetVolumeNameForVolumeMountPointA
DeleteVolumeMountPointA
GetCPInfo
PostQueuedCompletionStatus
MoveFileWithProgressA
CopyFileA
lstrcpynW
WriteConsoleW
GetBinaryTypeA
WriteConsoleOutputW
GetCommandLineA
InterlockedIncrement
CreateActCtxW
FormatMessageA
GetModuleHandleW
GetModuleHandleA
LeaveCriticalSection
GetStringTypeExA
OpenMutexW
FindResourceW
RtlCaptureContext
InterlockedExchange
InitializeCriticalSectionAndSpinCount
DeleteFiber
InterlockedExchangeAdd
EnumDateFormatsA
GetPrivateProfileStructA
GetNamedPipeHandleStateW
RegisterWaitForSingleObject
LocalAlloc
QueryMemoryResourceNotification
SetLastError
GetProcessPriorityBoost
GetMailslotInfo
HeapWalk
SetFilePointer
SetConsoleMode
RaiseException
RtlUnwind
GetLastError
MoveFileA
DeleteFileA
GetStartupInfoA
HeapAlloc
HeapFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
Sleep
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
EnterCriticalSection
VirtualAlloc
HeapReAlloc
HeapSize
GetACP
GetOEMCP
IsValidCodePage
GetLocaleInfoA
GetStringTypeA
MultiByteToWideChar
LCMapStringA
LCMapStringW
user32
CharUpperBuffW
winhttp
WinHttpCreateUrl
Sections
.text Size: 55KB - Virtual size: 55KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3.9MB - Virtual size: 5.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 19KB - Virtual size: 3.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ