Static task
static1
General
-
Target
5ddcc10be17efb5bd5187ab0eb81fdb719c42fdbd3f61e5d3f2fe3217ac58274
-
Size
4.1MB
-
MD5
45934bda32fc45775d4aa71c127f25c5
-
SHA1
ef0fd2ef7da5890548dda223b1390fa6fb5f5667
-
SHA256
5ddcc10be17efb5bd5187ab0eb81fdb719c42fdbd3f61e5d3f2fe3217ac58274
-
SHA512
661fdeb76c0bcfef0ce934078b4f22e42b2fdefc27c5a9c1e7dab778765c56dbb6fbdf8e749197d1da7b2bcc70cba86f9c86c01a04f66f9a26d5badfef1a1653
-
SSDEEP
98304:uCuDvNM85ITm/CZiRiTgzqLcB5yp6fLO+vYKuHC8j5rqeYq:uzbNJ5ITmKURiWq05oQO+9urjpq2
Malware Config
Signatures
Files
-
5ddcc10be17efb5bd5187ab0eb81fdb719c42fdbd3f61e5d3f2fe3217ac58274.exe windows x86
ada1574921758b94bdbbaf1a2bb072a7
Code Sign
a7:df:95:54:f1:f2:ab:4f:8d:9d:f2:8a:33:27:77:d9Certificate
IssuerPOSTALCODE=10305Not Before02-12-2022 05:48Not After02-12-2023 05:48SubjectPOSTALCODE=103055b:ed:df:07:fe:fc:81:ea:74:c0:8a:28:fb:da:cc:a6:73:f6:2b:db:ee:00:d3:43:e1:87:f4:42:04:76:a0:eaSigner
Actual PE Digest5b:ed:df:07:fe:fc:81:ea:74:c0:8a:28:fb:da:cc:a6:73:f6:2b:db:ee:00:d3:43:e1:87:f4:42:04:76:a0:eaDigest Algorithmsha256PE Digest MatchestrueSignature Validations
TrustedfalseVerification
Signing CertificatePOSTALCODE=1030501-12-2022 14:34 Valid: false
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetComputerNameA
FillConsoleOutputCharacterA
lstrcpynA
AddConsoleAliasW
CreateHardLinkA
GetSystemDefaultLCID
GetModuleHandleW
GetConsoleAliasesA
WaitNamedPipeW
GetVolumePathNameW
SetFileShortNameW
GetVolumeInformationA
GetCalendarInfoA
LeaveCriticalSection
GetFileAttributesA
GetNamedPipeInfo
GetFileAttributesW
WriteConsoleW
GetBinaryTypeA
GetACP
lstrlenW
CreateJobObjectA
LCMapStringA
GetConsoleAliasesW
GetVolumeNameForVolumeMountPointA
FillConsoleOutputCharacterW
GetLastError
SetLastError
ReadConsoleOutputCharacterA
GetProcAddress
VirtualAlloc
SetFirmwareEnvironmentVariableW
CreateNamedPipeA
CopyFileA
EnumSystemCodePagesW
LoadLibraryA
WriteConsoleA
GetProcessWorkingSetSize
LocalAlloc
AddAtomW
FindNextChangeNotification
OpenJobObjectW
FoldStringW
GetModuleHandleA
GetFileAttributesExW
GlobalReAlloc
DeleteFileA
GetCPInfoExW
GetFullPathNameW
HeapAlloc
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
DeleteCriticalSection
EnterCriticalSection
VirtualFree
HeapReAlloc
HeapCreate
Sleep
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
HeapSize
RtlUnwind
SetHandleCount
GetFileType
GetStartupInfoA
SetFilePointer
GetCPInfo
GetOEMCP
IsValidCodePage
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
CloseHandle
CreateFileA
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
SetStdHandle
FlushFileBuffers
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
RaiseException
SetEndOfFile
GetProcessHeap
ReadFile
GetConsoleOutputCP
advapi32
CreateRestrictedToken
Sections
.text Size: 78KB - Virtual size: 78KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3.9MB - Virtual size: 3.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 90KB - Virtual size: 4.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ