Static task
static1
General
-
Target
0176c9cc7df4bdaba8519fc773b77a1237d9d8296ac23cfe5f2210a997ff208c
-
Size
4.0MB
-
MD5
dbfd3b984940d91336697b515a474ab3
-
SHA1
e4db85e62759b81a8623259419184acc1a35b282
-
SHA256
0176c9cc7df4bdaba8519fc773b77a1237d9d8296ac23cfe5f2210a997ff208c
-
SHA512
dc8e3378cf187660e67ea16ff58c75b92a7783a67614538bc49d7ecc25ace43483914a3a9cbc8b6c0cafea9641088e7fab05b83eadce98a382de53693df7fc9b
-
SSDEEP
98304:ASEWYIKCjg9GrCqxWgeDl5wBUpG8m5VWSWf+yrMhI/iZq:ZsCjgErCgM5CBUcafhYhhq
Malware Config
Signatures
Files
-
0176c9cc7df4bdaba8519fc773b77a1237d9d8296ac23cfe5f2210a997ff208c.exe windows x86
a47515f9ebd7f251f383b85609098a78
Code Sign
2c:67:22:89:25:b8:49:3b:17:f0:b6:7b:2d:f5:04:a0Certificate
IssuerPOSTALCODE=10305Not Before13/02/2023, 10:21Not After13/02/2024, 10:21SubjectPOSTALCODE=1030547:f0:ba:09:d3:01:53:d0:67:ff:60:17:6c:52:ce:f8:fc:ea:8e:c6:cd:d1:79:75:7f:b2:8d:c5:30:3e:f0:d1Signer
Actual PE Digest47:f0:ba:09:d3:01:53:d0:67:ff:60:17:6c:52:ce:f8:fc:ea:8e:c6:cd:d1:79:75:7f:b2:8d:c5:30:3e:f0:d1Digest Algorithmsha256PE Digest MatchestrueSignature Validations
TrustedfalseVerification
Signing CertificatePOSTALCODE=1030507/02/2023, 20:52 Valid: false
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
RequestWakeupLatency
CreateFileW
FindActCtxSectionStringW
WriteConsoleInputW
GetCPInfoExA
GetWindowsDirectoryW
FindFirstVolumeMountPointA
CreateDirectoryExA
LocalFlags
WaitForMultipleObjects
ReadConsoleInputA
FindNextVolumeMountPointW
VerifyVersionInfoW
GetVersionExA
GetProcessId
OpenEventA
CreateFileMappingW
GetLocaleInfoW
GetProcAddress
LocalAlloc
GetCommandLineW
GetUserDefaultLCID
OpenMutexW
GetConsoleTitleA
SearchPathW
FindResourceA
LoadLibraryW
GetPriorityClass
GetLastError
GetProfileSectionA
WriteProfileStringA
GetConsoleAliasW
WritePrivateProfileSectionW
GlobalFlags
GetConsoleAliasesLengthA
DeleteVolumeMountPointW
FindResourceW
SetVolumeMountPointA
HeapAlloc
GetComputerNameA
GetCurrentProcessId
CreateNamedPipeA
EnumResourceLanguagesW
TransactNamedPipe
_hwrite
EnumTimeFormatsW
ZombifyActCtx
DeleteVolumeMountPointA
GetModuleHandleA
ReleaseActCtx
WritePrivateProfileStringA
GetSystemDirectoryA
GetSystemPowerStatus
SetThreadAffinityMask
GetLongPathNameA
EnumTimeFormatsA
VerifyVersionInfoA
EnumCalendarInfoA
FindNextFileA
SetLastError
SetCriticalSectionSpinCount
WriteConsoleW
CloseHandle
RaiseException
RtlUnwind
HeapFree
DeleteFileA
HeapSetInformation
GetStartupInfoW
EncodePointer
DecodePointer
IsProcessorFeaturePresent
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetModuleHandleW
GetCurrentThreadId
InterlockedDecrement
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
HeapCreate
EnterCriticalSection
LeaveCriticalSection
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
Sleep
HeapSize
WideCharToMultiByte
LCMapStringW
MultiByteToWideChar
GetStringTypeW
HeapReAlloc
GetConsoleCP
GetConsoleMode
FlushFileBuffers
ReadFile
SetFilePointer
SetStdHandle
user32
GetComboBoxInfo
Sections
.text Size: 98KB - Virtual size: 98KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3.9MB - Virtual size: 5.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 19KB - Virtual size: 3.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ