Static task
static1
General
-
Target
c004bc60588b380062ffab5756c1b44b309d9d52821d4beda334958146219ea0
-
Size
4.1MB
-
MD5
0f94ad391fdd0be0fa7ca02e6997cbfa
-
SHA1
378c3458379ffbd8af45453961f1288d0adfdde7
-
SHA256
c004bc60588b380062ffab5756c1b44b309d9d52821d4beda334958146219ea0
-
SHA512
30a1ade9670227a2cc709bd13e50d47cb5dd2f5168c57994909676f8d17b8582630a77d0c82ce76cb841299893418b5ce98502ed963982ca7217c9c4daa3e657
-
SSDEEP
98304:WZWqEuz9lwfPwwwhFXBUzcboLtY5KGBLd7CfaXh:eWQhlw3whFazcboe5Kkd7Cf8h
Malware Config
Signatures
Files
-
c004bc60588b380062ffab5756c1b44b309d9d52821d4beda334958146219ea0.exe windows x86
414196579e6deba9a4c60289c3dcc83e
Code Sign
b5:03:d2:81:50:a1:65:6b:0b:a4:8d:a6:96:cb:82:8fCertificate
IssuerPOSTALCODE=10307Not Before29-01-2023 12:48Not After29-01-2024 12:48SubjectPOSTALCODE=10307d8:ec:3f:72:c0:36:c6:a1:cb:b3:ab:94:93:a1:d7:27:cc:70:ed:cd:af:aa:27:ac:fa:b7:db:ef:88:e0:cd:52Signer
Actual PE Digestd8:ec:3f:72:c0:36:c6:a1:cb:b3:ab:94:93:a1:d7:27:cc:70:ed:cd:af:aa:27:ac:fa:b7:db:ef:88:e0:cd:52Digest Algorithmsha256PE Digest MatchestrueSignature Validations
TrustedfalseVerification
Signing CertificatePOSTALCODE=1030720-01-2023 15:46 Valid: false
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetPriorityClass
SetLocalTime
InterlockedIncrement
GetCurrentProcess
SetHandleInformation
GetWindowsDirectoryA
GetGeoInfoW
GetConsoleAliasExesW
FindResourceExA
GlobalAlloc
DnsHostnameToComputerNameW
EnumSystemCodePagesA
GetConsoleAliasW
WriteConsoleW
EnumResourceLanguagesA
ReadFile
GetThreadPriorityBoost
GetDevicePowerState
IsBadStringPtrA
LCMapStringA
GetConsoleAliasesW
SetLastError
GetProcAddress
VirtualAlloc
LoadLibraryA
WriteConsoleA
GetCommMask
AddAtomA
SetCommMask
FoldStringA
SetNamedPipeHandleState
GetModuleHandleA
BuildCommDCBA
GetCPInfoExA
EndUpdateResourceA
TerminateJobObject
GetVolumeNameForVolumeMountPointW
LCMapStringW
GetStringTypeW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
GetModuleHandleW
Sleep
ExitProcess
GetLastError
WriteFile
GetStdHandle
GetModuleFileNameA
HeapAlloc
HeapFree
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
InterlockedDecrement
HeapSize
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
RtlUnwind
RaiseException
LeaveCriticalSection
EnterCriticalSection
TerminateProcess
IsDebuggerPresent
InitializeCriticalSectionAndSpinCount
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetLocaleInfoA
WideCharToMultiByte
GetStringTypeA
MultiByteToWideChar
user32
GetMenuItemID
LoadMenuA
ScreenToClient
Sections
.text Size: 55KB - Virtual size: 55KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3.9MB - Virtual size: 4.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bobuy Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.fome Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 152KB - Virtual size: 4.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ