Static task
static1
General
-
Target
67c65a4fa9a948167c2e3c0c1761726d0d8a6639ada6d22927e4b42a54fc77cd
-
Size
4.1MB
-
MD5
084e4e4f9d6b92015ac3340bd5ccccc1
-
SHA1
8a9c6e16779df45911b6c07fa9a57397bab04b17
-
SHA256
67c65a4fa9a948167c2e3c0c1761726d0d8a6639ada6d22927e4b42a54fc77cd
-
SHA512
55d966e10ed44a4973fabb755c92affa84a237824a215ec6e50fdda9bdb3f17978b08056c293d4bd76fee2c6815ef39b9094f75e986b3055d6a1ebbdf5cebb68
-
SSDEEP
98304:YlNTHOi160qyErSQ3u5j6XIvT9zavcsvEnQuEfWI8ysLOhxo5Aeq:G1EzrSKGj6c9aEszY+05A3
Malware Config
Signatures
Files
-
67c65a4fa9a948167c2e3c0c1761726d0d8a6639ada6d22927e4b42a54fc77cd.exe windows x86
2a3446625592e0299ff9a4018647956d
Code Sign
52:6c:a3:78:fb:5d:20:47:91:f2:b8:d0:6e:53:23:5eCertificate
IssuerPOSTALCODE=10305Not Before01/04/2023, 08:24Not After31/03/2024, 08:24SubjectPOSTALCODE=103052e:4e:35:8c:c3:bc:f6:6d:ef:58:67:17:e2:54:69:f6:b5:66:81:aa:b7:8c:e5:1a:48:34:bf:37:e0:4d:0b:b3Signer
Actual PE Digest2e:4e:35:8c:c3:bc:f6:6d:ef:58:67:17:e2:54:69:f6:b5:66:81:aa:b7:8c:e5:1a:48:34:bf:37:e0:4d:0b:b3Digest Algorithmsha256PE Digest MatchestrueSignature Validations
TrustedfalseVerification
Signing CertificatePOSTALCODE=1030530/03/2023, 10:56 Valid: false
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetPrivateProfileSectionNamesW
CreateTimerQueue
CreateMutexW
SearchPathW
lstrcmpA
EnumCalendarInfoA
GetModuleHandleExA
SetLocalTime
_llseek
BuildCommDCBAndTimeoutsA
CallNamedPipeA
LocalCompact
EnumCalendarInfoW
SetDefaultCommConfigW
GetEnvironmentStringsW
InterlockedCompareExchange
WriteConsoleInputA
BackupSeek
FindActCtxSectionStringA
GetDriveTypeA
GlobalAlloc
GetFirmwareEnvironmentVariableA
LoadLibraryW
GetFileAttributesA
TransactNamedPipe
GetConsoleAliasW
GetSystemDirectoryA
CompareStringW
PulseEvent
DeactivateActCtx
GetConsoleOutputCP
SetLastError
GetProcAddress
GetComputerNameExW
WriteProfileSectionA
ResetEvent
OpenWaitableTimerA
OpenMutexA
LocalAlloc
SetCalendarInfoW
DnsHostnameToComputerNameA
RemoveDirectoryW
AddAtomA
WaitForMultipleObjects
EnumResourceTypesW
FindNextFileA
FindFirstVolumeMountPointA
GetModuleHandleA
SetLocaleInfoW
GetStringTypeW
WaitForDebugEvent
GetCurrentThreadId
GetWindowsDirectoryW
DeleteFileW
CopyFileExA
EnumSystemLocalesA
GetLocaleInfoA
GetDevicePowerState
GetDateFormatW
HeapAlloc
GetLastError
DeleteFileA
GetCommandLineA
HeapSetInformation
GetStartupInfoW
GetModuleHandleW
ExitProcess
DecodePointer
WriteFile
GetStdHandle
GetModuleFileNameW
HeapCreate
HeapDestroy
EncodePointer
EnterCriticalSection
LeaveCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
InterlockedDecrement
GetCurrentThread
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
FatalAppExitA
SetConsoleCtrlHandler
FreeLibrary
InterlockedExchange
GetLocaleInfoW
Sleep
HeapFree
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
RtlUnwind
HeapSize
HeapReAlloc
GetConsoleCP
GetConsoleMode
FlushFileBuffers
LCMapStringW
MultiByteToWideChar
SetFilePointer
IsProcessorFeaturePresent
CloseHandle
WriteConsoleW
SetStdHandle
CreateFileW
GetUserDefaultLCID
IsValidLocale
user32
LoadMenuW
advapi32
ReportEventW
Sections
.text Size: 86KB - Virtual size: 85KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3.9MB - Virtual size: 43.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 70KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ