Static task
static1
General
-
Target
570045a72df2b5f254177abda49b7ddb4f6b0c8a79dad36709660c0c26be430a
-
Size
4.2MB
-
MD5
c829860fcdc35a3182f27e895048bde4
-
SHA1
c0477c2f197a350453e2750d09f7e80226fa9d0a
-
SHA256
570045a72df2b5f254177abda49b7ddb4f6b0c8a79dad36709660c0c26be430a
-
SHA512
126c205ca06c5fd0b71453ff3c306b91f35166609d9e3596e0a5e309d07fe2fd5d1bdb71bc304c53eda4dedc75372ea37b22a6c97472cecf33f01b311c2b7419
-
SSDEEP
98304:x+Nzx83ET5f0fipBXcASGXcpTOCUtUOg71pmJ1co1E:734MfuXcgMpTOztlekfk
Malware Config
Signatures
Files
-
570045a72df2b5f254177abda49b7ddb4f6b0c8a79dad36709660c0c26be430a.exe windows x86
abf9812c144b37aad537ff6f220c83df
Code Sign
e1:52:65:40:5c:44:c1:b9:8f:c4:8c:35:d6:4f:2c:d8Certificate
IssuerPOSTALCODE=10305Not Before21/03/2023, 19:29Not After20/03/2024, 19:29SubjectPOSTALCODE=10305a0:80:d9:e1:21:c6:be:fb:0b:52:26:1f:d1:0a:c4:0a:0b:7b:60:5f:da:94:dd:88:e5:f1:e8:6b:86:7c:33:edSigner
Actual PE Digesta0:80:d9:e1:21:c6:be:fb:0b:52:26:1f:d1:0a:c4:0a:0b:7b:60:5f:da:94:dd:88:e5:f1:e8:6b:86:7c:33:edDigest Algorithmsha256PE Digest MatchestrueSignature Validations
TrustedfalseVerification
Signing CertificatePOSTALCODE=1030521/03/2023, 12:23 Valid: false
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindVolumeClose
lstrcpynA
WaitNamedPipeA
GetLogicalDriveStringsW
GlobalSize
CreateHardLinkA
WaitForSingleObjectEx
GetConsoleAliasesA
GetCompressedFileSizeW
LoadLibraryW
GetConsoleMode
InterlockedPopEntrySList
GetWriteWatch
GetFileAttributesW
WritePrivateProfileStringW
GetConsoleAliasesW
GetLastError
GetProcAddress
EnumSystemCodePagesW
CreateMemoryResourceNotification
GetNumaHighestNodeNumber
WriteConsoleA
LocalAlloc
BeginUpdateResourceA
FoldStringA
FreeEnvironmentStringsW
DeleteTimerQueueTimer
GlobalAddAtomW
FlushFileBuffers
CloseHandle
CreateFileA
WriteConsoleW
GetConsoleOutputCP
SetStdHandle
GetModuleHandleA
VirtualAlloc
SetDefaultCommConfigA
InterlockedIncrement
InterlockedDecrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
HeapFree
MultiByteToWideChar
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
GetStartupInfoW
RtlUnwind
RaiseException
LCMapStringA
WideCharToMultiByte
LCMapStringW
GetCPInfo
GetModuleHandleW
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
HeapAlloc
HeapCreate
VirtualFree
HeapReAlloc
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
GetModuleFileNameW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapSize
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
GetStringTypeW
LoadLibraryA
InitializeCriticalSectionAndSpinCount
SetFilePointer
GetConsoleCP
GetLocaleInfoW
user32
ClientToScreen
LoadMenuA
MessageBoxIndirectA
GetKBCodePage
GetListBoxInfo
GetCaretPos
SetScrollInfo
GetShellWindow
gdi32
GetCharWidthI
Sections
.text Size: 4.0MB - Virtual size: 4.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 21KB - Virtual size: 3.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 136KB - Virtual size: 619KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ