Resubmissions
03-01-2023 07:42
230103-jjp7jaea51 10Static task
static1
General
-
Target
New Order Details.exe
-
Size
2.2MB
-
MD5
1b4859e000f6753b4efd084980fde02a
-
SHA1
fba9243cc97fc38b233f6a99ff61336291d292d8
-
SHA256
27e0631abf3a80dd7868661aa940d045bdde97fefc638f80e552c63c74f91d9c
-
SHA512
9a42e1a356be394c31b4a55b8c6e8ba6f4cebb659a70ff568d165fdf9252a35af26faa18c53f61367dfafd976e12cd8d5e5f12b0efe9139b9b8e85ebc93e96a5
-
SSDEEP
6144:k1zUN8//p+kqKf45bXugNp3DrUb6WhAaQKKMqWubjwH9wetGMx91PpRML4Zay4Sd:9N8//p+kXcDwVBgIBuPS
Malware Config
Signatures
Files
-
New Order Details.exe.exe windows x86
400d1fed13cc112897c878a3d178f6bd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTimeZoneInformation
GetFileSizeEx
GetConsoleMode
GetConsoleWindow
WideCharToMultiByte
FormatMessageA
LocalFree
FindResourceW
SizeofResource
LockResource
LoadResource
GetModuleFileNameA
FindResourceExW
VirtualProtectEx
VirtualAlloc
GetVersion
GetCurrentThread
GetCurrentProcess
Sleep
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
HeapDestroy
SetLastError
GetLastError
RaiseException
CloseHandle
SetFilePointerEx
DecodePointer
GetConsoleOutputCP
FlushFileBuffers
GetStringTypeW
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
IsDebuggerPresent
OutputDebugStringW
EnterCriticalSection
LeaveCriticalSection
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
GetModuleHandleW
GetProcAddress
IsProcessorFeaturePresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
TerminateProcess
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RtlUnwind
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
GetSystemInfo
VirtualProtect
VirtualQuery
CreateFileW
GetDriveTypeW
GetFileInformationByHandle
GetFileType
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
GetStdHandle
WriteFile
GetCommandLineA
GetCommandLineW
CompareStringW
LCMapStringW
GetCurrentDirectoryW
GetFullPathNameW
MultiByteToWideChar
SetStdHandle
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
WriteConsoleW
user32
ShowWindow
IsWindowVisible
MessageBoxA
advapi32
GetNamedSecurityInfoA
ConvertSecurityDescriptorToStringSecurityDescriptorA
ConvertSidToStringSidA
LookupPrivilegeDisplayNameA
LookupPrivilegeNameA
LookupPrivilegeValueA
LookupAccountSidA
RevertToSelf
MakeSelfRelativeSD
IsValidSid
ImpersonateSelf
GetTokenInformation
GetSidSubAuthorityCount
GetSidSubAuthority
GetSecurityDescriptorSacl
GetSecurityDescriptorOwner
GetSecurityDescriptorLength
GetSecurityDescriptorGroup
GetSecurityDescriptorDacl
GetSecurityDescriptorControl
GetLengthSid
GetAclInformation
GetAce
EqualSid
CopySid
AdjustTokenPrivileges
OpenThreadToken
OpenProcessToken
SetThreadToken
shell32
SHGetFolderPathA
ole32
StringFromGUID2
shlwapi
PathStripPathA
userenv
UnloadUserProfile
Sections
.text Size: 125KB - Virtual size: 124KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2.0MB - Virtual size: 2.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ