Static task
static1
General
-
Target
63d1cc92c49c2d1617c30174eca5ceb7a6603ac148a987ebb0dad28282425cbd
-
Size
4.1MB
-
MD5
d0e101d91fa445e0cc173290b16fe028
-
SHA1
ab770bdf51415673d023ec7e4f5e32ec1de73e8b
-
SHA256
63d1cc92c49c2d1617c30174eca5ceb7a6603ac148a987ebb0dad28282425cbd
-
SHA512
e2b8428c5ca47ebf3e09866fa9bc5cafc483ddfbb0d5a98962cb4ae69956955f73b2973ab718aacd48b988b27a2d0cc8071a23e9fc107094e36080494571f318
-
SSDEEP
98304:PipOmf+TFU3AABqW8SacTN0b1jyzZhI8w9Ldc6vG1HJnT:PipO7RUlnsaNPhIN9Ldc6O1HN
Malware Config
Signatures
Files
-
63d1cc92c49c2d1617c30174eca5ceb7a6603ac148a987ebb0dad28282425cbd.exe windows x86
2131db44a5c98e05f373c247645871f9
Code Sign
1d:fb:af:a0:75:30:75:43:5f:c6:93:b0:7c:f4:58:61Certificate
IssuerPOSTALCODE=10305Not Before01-04-2023 16:58Not After31-03-2024 16:58SubjectPOSTALCODE=1030507:22:8a:e6:df:76:1e:b7:71:cf:24:e0:48:a6:62:4e:92:93:d1:6c:0a:83:38:a8:a8:58:90:55:46:ed:6e:60Signer
Actual PE Digest07:22:8a:e6:df:76:1e:b7:71:cf:24:e0:48:a6:62:4e:92:93:d1:6c:0a:83:38:a8:a8:58:90:55:46:ed:6e:60Digest Algorithmsha256PE Digest MatchestrueSignature Validations
TrustedfalseVerification
Signing CertificatePOSTALCODE=1030530-03-2023 11:00 Valid: false
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateTimerQueue
CreateMutexW
SearchPathW
lstrcmpA
WriteConsoleInputW
GetModuleHandleExA
SetLocalTime
_llseek
CallNamedPipeA
LocalCompact
EnumCalendarInfoW
SetDefaultCommConfigW
GetEnvironmentStringsW
InterlockedCompareExchange
BackupSeek
FindActCtxSectionStringA
GetDriveTypeA
GlobalAlloc
LoadLibraryW
GetFileAttributesA
GetConsoleAliasW
GetSystemDirectoryA
CompareStringW
GetDevicePowerState
DeactivateActCtx
GetConsoleOutputCP
SetLastError
GetProcAddress
PulseEvent
WriteProfileSectionA
GetFirmwareEnvironmentVariableW
ResetEvent
OpenWaitableTimerA
OpenMutexA
LocalAlloc
SetCalendarInfoW
DnsHostnameToComputerNameA
GetFileType
BuildCommDCBAndTimeoutsW
RemoveDirectoryW
AddAtomA
WaitForMultipleObjects
EnumResourceTypesW
GetPrivateProfileSectionNamesA
FindNextFileA
FindFirstVolumeMountPointA
GetModuleHandleA
SetLocaleInfoW
ContinueDebugEvent
GetStringTypeW
GetCurrentThreadId
GetWindowsDirectoryW
DeleteFileW
CopyFileExA
EnumSystemLocalesA
GetLocaleInfoA
GetComputerNameExW
GetDateFormatW
GetLastError
DeleteFileA
GetCommandLineA
HeapSetInformation
GetStartupInfoW
HeapAlloc
EnterCriticalSection
LeaveCriticalSection
DecodePointer
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
TerminateProcess
GetCurrentProcess
GetModuleHandleW
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
SetHandleCount
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
InterlockedDecrement
GetCurrentThread
HeapCreate
HeapDestroy
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
HeapFree
FatalAppExitA
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
RtlUnwind
SetConsoleCtrlHandler
FreeLibrary
InterlockedExchange
GetLocaleInfoW
HeapReAlloc
GetConsoleCP
GetConsoleMode
FlushFileBuffers
LCMapStringW
MultiByteToWideChar
SetFilePointer
IsProcessorFeaturePresent
HeapSize
CloseHandle
WriteConsoleW
SetStdHandle
CreateFileW
GetUserDefaultLCID
IsValidLocale
user32
LoadMenuW
advapi32
ReportEventW
Sections
.text Size: 86KB - Virtual size: 85KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3.9MB - Virtual size: 43.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 69KB - Virtual size: 69KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ