Static task
static1
General
-
Target
087918f4ba4ce83037744e4f5318808b728ee909baec3583aefba31f5330f311
-
Size
4.1MB
-
MD5
92cdb723c9bc76df099e046630dafd3b
-
SHA1
3768f00fa6f7e88d6c292792c2c9a142649d32f9
-
SHA256
087918f4ba4ce83037744e4f5318808b728ee909baec3583aefba31f5330f311
-
SHA512
df46efaf21684ad0c33f0c767544ec5b642f0411c18d2497fc5493c5944f4ff3eb3067664644518e0233e55035fc7e72b8821fabed73ade4af4b3985b5575446
-
SSDEEP
98304:/ftowq6CEEa1HhX7d2cehq1CUZsttxdqIV0F6uQHq3dKmA:3to4TyUGttxkk0FcHcMx
Malware Config
Signatures
Files
-
087918f4ba4ce83037744e4f5318808b728ee909baec3583aefba31f5330f311.exe windows x86
aea30aa8311fa7a3ea56995ee020184d
Code Sign
7d:90:7d:b5:e1:59:74:db:9f:9e:0a:90:b9:ec:95:b5Certificate
IssuerPOSTALCODE=10407Not Before04-02-2023 09:22Not After04-02-2024 09:22SubjectPOSTALCODE=10407c7:40:8f:ee:dc:10:d0:2b:4d:b7:0d:9a:82:ec:66:70:5b:11:4b:bf:28:4e:2f:b1:b2:6c:1b:fc:fb:66:71:4fSigner
Actual PE Digestc7:40:8f:ee:dc:10:d0:2b:4d:b7:0d:9a:82:ec:66:70:5b:11:4b:bf:28:4e:2f:b1:b2:6c:1b:fc:fb:66:71:4fDigest Algorithmsha256PE Digest MatchestrueSignature Validations
TrustedfalseVerification
Signing CertificatePOSTALCODE=1040702-02-2023 17:59 Valid: false
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
GetConsoleAliasesA
RequestWakeupLatency
AddAtomA
CreateFileA
FindActCtxSectionStringA
GetCommProperties
GetSystemWindowsDirectoryA
WriteFile
FindFirstVolumeMountPointW
CreateDirectoryExW
GlobalSize
GetLogicalDriveStringsW
ReadConsoleInputW
GetComputerNameExW
FreeUserPhysicalPages
GetCurrentDirectoryA
ContinueDebugEvent
LCMapStringA
GetProcAddress
GlobalAlloc
GetCommandLineW
GetBinaryTypeW
InterlockedExchange
ReadConsoleOutputCharacterW
CreateMutexW
GetConsoleTitleA
SearchPathA
FindResourceW
FormatMessageW
GetModuleHandleA
EndUpdateResourceW
GetLastError
SetCommMask
LocalReAlloc
GetComputerNameExA
GetConsoleAliasA
TerminateThread
GlobalFlags
GetConsoleAliasesLengthW
GetVolumePathNameA
SetVolumeMountPointW
HeapAlloc
GetLocaleInfoA
GetComputerNameW
SetConsoleWindowInfo
DosDateTimeToFileTime
EnumResourceLanguagesW
LoadModule
GetOverlappedResult
QueryDosDeviceW
CreateActCtxA
DeleteVolumeMountPointA
MoveFileWithProgressW
AddRefActCtx
WritePrivateProfileStringA
GetUserDefaultLangID
QueryMemoryResourceNotification
WaitForSingleObject
GetLongPathNameW
InterlockedCompareExchange
EnumTimeFormatsW
VerifyVersionInfoA
FindNextFileW
GetConsoleAliasW
SetLastError
FreeLibrary
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RaiseException
RtlUnwind
HeapFree
MoveFileA
GetStartupInfoW
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
HeapReAlloc
Sleep
ExitProcess
GetStdHandle
GetModuleFileNameA
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapSize
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
InitializeCriticalSectionAndSpinCount
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetFilePointer
CloseHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
DeleteFileA
user32
GetMenuBarInfo
Sections
.text Size: 97KB - Virtual size: 96KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4.0MB - Virtual size: 4.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 3.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ