Static task
static1
General
-
Target
d42f31e0f605a3a2e4dfa11c82e62097a25f0d12d2c271c93492097a0b230121
-
Size
4.1MB
-
MD5
188ae2b232f4f10d2f210a86949daf9a
-
SHA1
a9209a9d67d8108e1fe0846f79bf7e8a8abb996b
-
SHA256
d42f31e0f605a3a2e4dfa11c82e62097a25f0d12d2c271c93492097a0b230121
-
SHA512
6f710db74499404320f5eb2c39e1f937e8a6245de26b4c11ad3fd22ba24ee786fcdf4996b0f5c1d960db3f460fafeb301793bfddae5a6de687a2b98ae1b84410
-
SSDEEP
98304:zsnt0cW1roMdpiMR5qZNa/e4pUJ0n4A9ahoW8:z/cCrXpJ5qKm4pUan4ApW8
Malware Config
Signatures
Files
-
d42f31e0f605a3a2e4dfa11c82e62097a25f0d12d2c271c93492097a0b230121.exe windows x86
99ff8bff99c874b1a1169c1f42931c72
Code Sign
1e:77:44:c3:27:65:cb:64:86:d8:a2:8b:cd:ed:04:31Certificate
IssuerPOSTALCODE=10407Not Before16/02/2023, 20:29Not After16/02/2024, 20:29SubjectPOSTALCODE=1040752:88:4e:ae:a1:8d:1c:89:de:74:85:1a:64:5d:ea:87:01:11:f0:6a:a2:22:af:c7:30:4b:aa:6d:95:76:db:83Signer
Actual PE Digest52:88:4e:ae:a1:8d:1c:89:de:74:85:1a:64:5d:ea:87:01:11:f0:6a:a2:22:af:c7:30:4b:aa:6d:95:76:db:83Digest Algorithmsha256PE Digest MatchestrueSignature Validations
TrustedfalseVerification
Signing CertificatePOSTALCODE=1040707/02/2023, 20:40 Valid: false
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteConsoleInputA
MoveFileWithProgressA
GetModuleHandleW
GetCurrentThread
GetConsoleAliasesA
GetNumberFormatA
GetGeoInfoW
LoadLibraryW
GetConsoleAliasExesLengthW
GetVersionExW
GetFileAttributesA
GetMailslotInfo
CreateActCtxA
GetBinaryTypeW
GetACP
InterlockedExchange
GetLastError
GetProcAddress
VirtualAlloc
RemoveDirectoryA
GetNumaHighestNodeNumber
PrepareTape
WriteConsoleA
UnhandledExceptionFilter
InterlockedExchangeAdd
OpenWaitableTimerW
LocalAlloc
IsSystemResumeAutomatic
GetDiskFreeSpaceA
OpenJobObjectW
SetConsoleCursorInfo
GetModuleHandleA
HeapSetInformation
EraseTape
GetStringTypeW
GetConsoleTitleW
FatalAppExitA
SetFileShortNameA
GetCurrentProcessId
InitializeCriticalSectionAndSpinCount
LoadLibraryA
HeapReAlloc
DeleteVolumeMountPointA
MapUserPhysicalPages
GetNativeSystemInfo
GetProcessWorkingSetSize
GetLocaleInfoA
MultiByteToWideChar
TerminateProcess
GetCurrentProcess
SetUnhandledExceptionFilter
IsDebuggerPresent
GetStartupInfoW
RaiseException
RtlUnwind
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
HeapAlloc
HeapFree
Sleep
HeapSize
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
LCMapStringA
WideCharToMultiByte
LCMapStringW
GetStringTypeA
LeaveCriticalSection
EnterCriticalSection
user32
GetClipCursor
GetCursorInfo
SetCaretPos
GetKeyNameTextW
RealGetWindowClassW
IsChild
LoadMenuA
CharLowerBuffW
CharUpperA
CharUpperBuffA
advapi32
ReportEventW
SetKernelObjectSecurity
MapGenericMask
LogonUserA
ole32
CoUninitialize
ReadClassStg
winhttp
WinHttpCheckPlatform
Sections
.text Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3.9MB - Virtual size: 5.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 81KB - Virtual size: 3.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ