Static task
static1
General
-
Target
7391a12381b127ae27aa14efef53bb9acd312c3d37f1b0eba3c996a64a36739d
-
Size
4.0MB
-
MD5
fc13b947c71abc24b763fc29be295575
-
SHA1
180b36d9a1e0e7e0732b881c7ea9ad8777235a81
-
SHA256
7391a12381b127ae27aa14efef53bb9acd312c3d37f1b0eba3c996a64a36739d
-
SHA512
a596efa44e99c1f3a108d64811551ba48cd287a0e3dc54e8a06f7d37ad3957a4c2f7b92f58254a232c0194100331f6a32855b597df4fb56e091b4c9a57c25b91
-
SSDEEP
98304:s4TjQmsEkhmeaa7PUMzUbwsdKG0YTU4HT4oYm/1uvdrWAROW4sLAz:RGF51LbzawQKTMUY/Ev9WA/5LAz
Malware Config
Signatures
Files
-
7391a12381b127ae27aa14efef53bb9acd312c3d37f1b0eba3c996a64a36739d.exe windows x86
a47515f9ebd7f251f383b85609098a78
Code Sign
b0:46:a2:9b:3b:9c:8e:4d:82:a5:73:44:2d:98:a7:47Certificate
IssuerPOSTALCODE=10407Not Before13-02-2023 08:14Not After13-02-2024 08:14SubjectPOSTALCODE=1040701:9b:53:ca:58:14:23:5c:94:1b:11:b4:c1:d5:45:6d:c4:e3:d3:dd:db:0d:e1:23:13:8b:0a:1d:a1:c7:4b:deSigner
Actual PE Digest01:9b:53:ca:58:14:23:5c:94:1b:11:b4:c1:d5:45:6d:c4:e3:d3:dd:db:0d:e1:23:13:8b:0a:1d:a1:c7:4b:deDigest Algorithmsha256PE Digest MatchestrueSignature Validations
TrustedfalseVerification
Signing CertificatePOSTALCODE=1040707-02-2023 20:42 Valid: false
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
RequestWakeupLatency
CreateFileW
FindActCtxSectionStringW
WriteConsoleInputW
GetCPInfoExA
GetWindowsDirectoryW
FindFirstVolumeMountPointA
CreateDirectoryExA
LocalFlags
WaitForMultipleObjects
ReadConsoleInputA
FindNextVolumeMountPointW
VerifyVersionInfoW
GetVersionExA
GetProcessId
OpenEventA
CreateFileMappingW
GetLocaleInfoW
GetProcAddress
LocalAlloc
GetCommandLineW
GetUserDefaultLCID
OpenMutexW
GetConsoleTitleA
SearchPathW
FindResourceA
LoadLibraryW
GetPriorityClass
GetLastError
GetProfileSectionA
WriteProfileStringA
GetConsoleAliasW
WritePrivateProfileSectionW
GlobalFlags
GetConsoleAliasesLengthA
DeleteVolumeMountPointW
FindResourceW
SetVolumeMountPointA
HeapAlloc
GetComputerNameA
GetCurrentProcessId
CreateNamedPipeA
EnumResourceLanguagesW
TransactNamedPipe
_hwrite
EnumTimeFormatsW
ZombifyActCtx
DeleteVolumeMountPointA
GetModuleHandleA
ReleaseActCtx
WritePrivateProfileStringA
GetSystemDirectoryA
GetSystemPowerStatus
SetThreadAffinityMask
GetLongPathNameA
EnumTimeFormatsA
VerifyVersionInfoA
EnumCalendarInfoA
FindNextFileA
SetLastError
SetCriticalSectionSpinCount
WriteConsoleW
CloseHandle
RaiseException
RtlUnwind
HeapFree
DeleteFileA
HeapSetInformation
GetStartupInfoW
EncodePointer
DecodePointer
IsProcessorFeaturePresent
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetModuleHandleW
GetCurrentThreadId
InterlockedDecrement
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
HeapCreate
EnterCriticalSection
LeaveCriticalSection
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
Sleep
HeapSize
WideCharToMultiByte
LCMapStringW
MultiByteToWideChar
GetStringTypeW
HeapReAlloc
GetConsoleCP
GetConsoleMode
FlushFileBuffers
ReadFile
SetFilePointer
SetStdHandle
user32
GetComboBoxInfo
Sections
.text Size: 98KB - Virtual size: 98KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3.9MB - Virtual size: 5.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 19KB - Virtual size: 3.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ