Static task
static1
General
-
Target
e9d43f48c5b6566d07ac0dc0cd62e99d8afe82683938b89977dfe1f549994a22
-
Size
4.1MB
-
MD5
36a2853761641588521ba701990aaeec
-
SHA1
a55bfcabfd3a9390f0fa8c35d92a894987dfcffd
-
SHA256
e9d43f48c5b6566d07ac0dc0cd62e99d8afe82683938b89977dfe1f549994a22
-
SHA512
ca3235aad015a2059dffeb4b6aead155c6c53a0e80399dcaee305a536bd2ee42a037bab955e2415a19ac9031cd6fd4bca85e239662440afe13fd94719d1b9230
-
SSDEEP
98304:c2WiC63QUVoC4dkRabWXp2H2LBS/2MnpALy94Gulrqb7w:cX44WabWZ2H2QvnpALym8w
Malware Config
Signatures
Files
-
e9d43f48c5b6566d07ac0dc0cd62e99d8afe82683938b89977dfe1f549994a22.exe windows x86
51ceb91dba0ace98219e4727f07b1743
Code Sign
cf:2a:4f:8d:f2:d9:ee:c6:90:4c:db:7b:f0:3e:49:fdCertificate
IssuerPOSTALCODE=10307Not Before02-02-2023 05:51Not After02-02-2024 05:51SubjectPOSTALCODE=1030773:d1:c2:0b:4d:78:fa:62:0f:1f:d2:06:f2:6c:42:99:d6:f0:ce:39:bf:42:22:fa:b3:7e:f3:17:0f:54:89:6dSigner
Actual PE Digest73:d1:c2:0b:4d:78:fa:62:0f:1f:d2:06:f2:6c:42:99:d6:f0:ce:39:bf:42:22:fa:b3:7e:f3:17:0f:54:89:6dDigest Algorithmsha256PE Digest MatchestrueSignature Validations
TrustedfalseVerification
Signing CertificatePOSTALCODE=1030720-01-2023 15:46 Valid: false
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVolumeNameForVolumeMountPointA
GetDateFormatW
lstrcpynA
FindResourceExW
WriteConsoleOutputCharacterA
BuildCommDCBAndTimeoutsA
EndUpdateResourceW
VerSetConditionMask
ReadConsoleA
GetCurrentProcess
SetHandleInformation
GetComputerNameW
GetProcessPriorityBoost
GetWindowsDirectoryA
GetGeoInfoW
GetConsoleAliasExesW
GlobalAlloc
SetConsoleCursorPosition
WriteConsoleW
EnumResourceLanguagesA
IsBadStringPtrA
LCMapStringA
InterlockedExchange
GetCPInfoExW
GetLastError
SetLastError
GetProcAddress
VirtualAlloc
EnumSystemCodePagesW
SetTimerQueueTimer
LoadLibraryA
WriteConsoleA
QueryDosDeviceW
GetCommMask
AddAtomA
FoldStringW
FoldStringA
SetConsoleCursorInfo
GetModuleHandleA
GetCommTimeouts
BuildCommDCBA
ReadConsoleInputW
TerminateJobObject
GetWindowsDirectoryW
GetTempPathA
GlobalReAlloc
LCMapStringW
GetStringTypeW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
GetModuleHandleW
Sleep
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
HeapAlloc
HeapFree
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
HeapSize
TerminateProcess
IsDebuggerPresent
RaiseException
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSectionAndSpinCount
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
RtlUnwind
GetLocaleInfoA
WideCharToMultiByte
GetStringTypeA
MultiByteToWideChar
user32
LoadMenuA
GetListBoxInfo
winhttp
WinHttpOpen
Sections
.text Size: 62KB - Virtual size: 61KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3.9MB - Virtual size: 4.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.somopux Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vajux Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 153KB - Virtual size: 4.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ