Static task
static1
General
-
Target
9197e9ecef5000cae25da69bc1ae3f3fc8c842f8af8dc3fee8224d913027d788
-
Size
4.0MB
-
MD5
e5e76b1d4f2e9b670771483fb385cf54
-
SHA1
f4da0c6d2bc718505debb6b5208f0edeb957f3d2
-
SHA256
9197e9ecef5000cae25da69bc1ae3f3fc8c842f8af8dc3fee8224d913027d788
-
SHA512
69eff178eb6152c3b217c015169650653bb298e1971da48c20ecab1592c36d38aab029f295673b0fa94ce884e62c46285953aefbff0b19498d813395bbd30a95
-
SSDEEP
98304:ASEWYIKCjg9GrCqxWgeDl5wBUpG8m5VWSWf+yrMhI/iZJ:ZsCjgErCgM5CBUcafhYhhJ
Malware Config
Signatures
Files
-
9197e9ecef5000cae25da69bc1ae3f3fc8c842f8af8dc3fee8224d913027d788.exe windows x86
a47515f9ebd7f251f383b85609098a78
Code Sign
bd:67:85:bb:2c:43:fc:07:e7:fc:9f:53:b2:22:99:b2Certificate
IssuerPOSTALCODE=10407Not Before13/02/2023, 10:16Not After13/02/2024, 10:16SubjectPOSTALCODE=1040747:f0:ba:09:d3:01:53:d0:67:ff:60:17:6c:52:ce:f8:fc:ea:8e:c6:cd:d1:79:75:7f:b2:8d:c5:30:3e:f0:d1Signer
Actual PE Digest47:f0:ba:09:d3:01:53:d0:67:ff:60:17:6c:52:ce:f8:fc:ea:8e:c6:cd:d1:79:75:7f:b2:8d:c5:30:3e:f0:d1Digest Algorithmsha256PE Digest MatchestrueSignature Validations
TrustedfalseVerification
Signing CertificatePOSTALCODE=1040707/02/2023, 20:39 Valid: false
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
RequestWakeupLatency
CreateFileW
FindActCtxSectionStringW
WriteConsoleInputW
GetCPInfoExA
GetWindowsDirectoryW
FindFirstVolumeMountPointA
CreateDirectoryExA
LocalFlags
WaitForMultipleObjects
ReadConsoleInputA
FindNextVolumeMountPointW
VerifyVersionInfoW
GetVersionExA
GetProcessId
OpenEventA
CreateFileMappingW
GetLocaleInfoW
GetProcAddress
LocalAlloc
GetCommandLineW
GetUserDefaultLCID
OpenMutexW
GetConsoleTitleA
SearchPathW
FindResourceA
LoadLibraryW
GetPriorityClass
GetLastError
GetProfileSectionA
WriteProfileStringA
GetConsoleAliasW
WritePrivateProfileSectionW
GlobalFlags
GetConsoleAliasesLengthA
DeleteVolumeMountPointW
FindResourceW
SetVolumeMountPointA
HeapAlloc
GetComputerNameA
GetCurrentProcessId
CreateNamedPipeA
EnumResourceLanguagesW
TransactNamedPipe
_hwrite
EnumTimeFormatsW
ZombifyActCtx
DeleteVolumeMountPointA
GetModuleHandleA
ReleaseActCtx
WritePrivateProfileStringA
GetSystemDirectoryA
GetSystemPowerStatus
SetThreadAffinityMask
GetLongPathNameA
EnumTimeFormatsA
VerifyVersionInfoA
EnumCalendarInfoA
FindNextFileA
SetLastError
SetCriticalSectionSpinCount
WriteConsoleW
CloseHandle
RaiseException
RtlUnwind
HeapFree
DeleteFileA
HeapSetInformation
GetStartupInfoW
EncodePointer
DecodePointer
IsProcessorFeaturePresent
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetModuleHandleW
GetCurrentThreadId
InterlockedDecrement
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
HeapCreate
EnterCriticalSection
LeaveCriticalSection
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
Sleep
HeapSize
WideCharToMultiByte
LCMapStringW
MultiByteToWideChar
GetStringTypeW
HeapReAlloc
GetConsoleCP
GetConsoleMode
FlushFileBuffers
ReadFile
SetFilePointer
SetStdHandle
user32
GetComboBoxInfo
Sections
.text Size: 98KB - Virtual size: 98KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3.9MB - Virtual size: 5.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 19KB - Virtual size: 3.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ