Static task
static1
General
-
Target
442ed16927afc11aa4c3df3edd12b05b3832fd8cb666fc17a817b80e020ea831
-
Size
4.1MB
-
MD5
270e7a58b4b8fafa9631eeca55946dc1
-
SHA1
5e9cf5d09fd43cbd39b44589b606cd33de86dc96
-
SHA256
442ed16927afc11aa4c3df3edd12b05b3832fd8cb666fc17a817b80e020ea831
-
SHA512
89cb29215ad1db32705134fc8a3261757461e667d481eda70ef8e1d5fe312071a2898346ea861c8c691c613fa61cbfd5de3afcb0d1b5b88e8cdebf6bc719fa81
-
SSDEEP
98304:c2WiC63QUVoC4dkRabWXp2H2LBS/2MnpALy94Gulrqb7x:cX44WabWZ2H2QvnpALym8x
Malware Config
Signatures
Files
-
442ed16927afc11aa4c3df3edd12b05b3832fd8cb666fc17a817b80e020ea831.exe windows x86
51ceb91dba0ace98219e4727f07b1743
Code Sign
95:92:cd:67:d4:3d:c8:f4:96:a4:f6:47:4a:c7:fe:7bCertificate
IssuerPOSTALCODE=10305Not Before02-02-2023 06:05Not After02-02-2024 06:05SubjectPOSTALCODE=1030573:d1:c2:0b:4d:78:fa:62:0f:1f:d2:06:f2:6c:42:99:d6:f0:ce:39:bf:42:22:fa:b3:7e:f3:17:0f:54:89:6dSigner
Actual PE Digest73:d1:c2:0b:4d:78:fa:62:0f:1f:d2:06:f2:6c:42:99:d6:f0:ce:39:bf:42:22:fa:b3:7e:f3:17:0f:54:89:6dDigest Algorithmsha256PE Digest MatchestrueSignature Validations
TrustedfalseVerification
Signing CertificatePOSTALCODE=1030520-01-2023 16:00 Valid: false
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVolumeNameForVolumeMountPointA
GetDateFormatW
lstrcpynA
FindResourceExW
WriteConsoleOutputCharacterA
BuildCommDCBAndTimeoutsA
EndUpdateResourceW
VerSetConditionMask
ReadConsoleA
GetCurrentProcess
SetHandleInformation
GetComputerNameW
GetProcessPriorityBoost
GetWindowsDirectoryA
GetGeoInfoW
GetConsoleAliasExesW
GlobalAlloc
SetConsoleCursorPosition
WriteConsoleW
EnumResourceLanguagesA
IsBadStringPtrA
LCMapStringA
InterlockedExchange
GetCPInfoExW
GetLastError
SetLastError
GetProcAddress
VirtualAlloc
EnumSystemCodePagesW
SetTimerQueueTimer
LoadLibraryA
WriteConsoleA
QueryDosDeviceW
GetCommMask
AddAtomA
FoldStringW
FoldStringA
SetConsoleCursorInfo
GetModuleHandleA
GetCommTimeouts
BuildCommDCBA
ReadConsoleInputW
TerminateJobObject
GetWindowsDirectoryW
GetTempPathA
GlobalReAlloc
LCMapStringW
GetStringTypeW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
GetModuleHandleW
Sleep
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
HeapAlloc
HeapFree
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
HeapSize
TerminateProcess
IsDebuggerPresent
RaiseException
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSectionAndSpinCount
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
RtlUnwind
GetLocaleInfoA
WideCharToMultiByte
GetStringTypeA
MultiByteToWideChar
user32
LoadMenuA
GetListBoxInfo
winhttp
WinHttpOpen
Sections
.text Size: 62KB - Virtual size: 61KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3.9MB - Virtual size: 4.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.somopux Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vajux Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 153KB - Virtual size: 4.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ