Resubmissions
03-01-2023 05:51
230103-gkf9xaad29 10Static task
static1
General
-
Target
New Order Details.rar
-
Size
236KB
-
MD5
b597f31f8813b665556abc9208f947f8
-
SHA1
4ddbe026f1d8b4c81036c394dd3654344d6e15d6
-
SHA256
ddc760f8b261647a48ec4e00105f3e8442b29558ab1b456306f2f23062d29a99
-
SHA512
57bfd7d006fe79887034430175089d9c7d2f19fb789ced596ec3b220085639f7dc389f7c087824b845921230f1b325762ab8b0030977c60ee3fc51aa5f6e4598
-
SSDEEP
6144:YCnHo9Z/L83CMiw+6qGdCIFmQfSDV+QJya43fkv47eql:borgJiwVprFLiMaKeql
Malware Config
Signatures
Files
-
New Order Details.rar.rar
-
New Order Details.exe.exe windows x86
400d1fed13cc112897c878a3d178f6bd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTimeZoneInformation
GetFileSizeEx
GetConsoleMode
GetConsoleWindow
WideCharToMultiByte
FormatMessageA
LocalFree
FindResourceW
SizeofResource
LockResource
LoadResource
GetModuleFileNameA
FindResourceExW
VirtualProtectEx
VirtualAlloc
GetVersion
GetCurrentThread
GetCurrentProcess
Sleep
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
HeapDestroy
SetLastError
GetLastError
RaiseException
CloseHandle
SetFilePointerEx
DecodePointer
GetConsoleOutputCP
FlushFileBuffers
GetStringTypeW
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
IsDebuggerPresent
OutputDebugStringW
EnterCriticalSection
LeaveCriticalSection
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
GetModuleHandleW
GetProcAddress
IsProcessorFeaturePresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
TerminateProcess
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RtlUnwind
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
GetSystemInfo
VirtualProtect
VirtualQuery
CreateFileW
GetDriveTypeW
GetFileInformationByHandle
GetFileType
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
GetStdHandle
WriteFile
GetCommandLineA
GetCommandLineW
CompareStringW
LCMapStringW
GetCurrentDirectoryW
GetFullPathNameW
MultiByteToWideChar
SetStdHandle
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
WriteConsoleW
user32
ShowWindow
IsWindowVisible
MessageBoxA
advapi32
GetNamedSecurityInfoA
ConvertSecurityDescriptorToStringSecurityDescriptorA
ConvertSidToStringSidA
LookupPrivilegeDisplayNameA
LookupPrivilegeNameA
LookupPrivilegeValueA
LookupAccountSidA
RevertToSelf
MakeSelfRelativeSD
IsValidSid
ImpersonateSelf
GetTokenInformation
GetSidSubAuthorityCount
GetSidSubAuthority
GetSecurityDescriptorSacl
GetSecurityDescriptorOwner
GetSecurityDescriptorLength
GetSecurityDescriptorGroup
GetSecurityDescriptorDacl
GetSecurityDescriptorControl
GetLengthSid
GetAclInformation
GetAce
EqualSid
CopySid
AdjustTokenPrivileges
OpenThreadToken
OpenProcessToken
SetThreadToken
shell32
SHGetFolderPathA
ole32
StringFromGUID2
shlwapi
PathStripPathA
userenv
UnloadUserProfile
Sections
.text Size: 125KB - Virtual size: 124KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2.0MB - Virtual size: 2.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ