Static task
static1
General
-
Target
a76389dd5111377c90b3a0e8e584be64c2b6ee617f1dedba3295c720703059ed
-
Size
4.2MB
-
MD5
81ad5985839c7393196a6ad03ea383bd
-
SHA1
4f188f8600a70c979abdc73ecd4352bcc3331545
-
SHA256
a76389dd5111377c90b3a0e8e584be64c2b6ee617f1dedba3295c720703059ed
-
SHA512
dd7b6652328ce6e767037b299b104c97a8e2ae5e7343bd44728e9a8ae4b63a8f9da2460ed5c063835f910ac234b03693cf3b07420ba41db5884dfbf9542dc555
-
SSDEEP
98304:oUN2By2xjY+m1X8arWbboECDea+7IVGxg8FmFC:NQByUjY8aK7lVIVGxg88E
Malware Config
Signatures
Files
-
a76389dd5111377c90b3a0e8e584be64c2b6ee617f1dedba3295c720703059ed.exe windows x86
03eb8742ab33fee1eab919f6223f125e
Code Sign
03:4a:59:23:df:3f:40:84:92:73:d1:d1:da:56:95:0bCertificate
IssuerCN=522434573635311625120101053d123d53210e113336571014061e5d361525000421,POSTALCODE=10407,ST=0b1c1115005f5c4e0f020a1000040b144b0114+ST=0b1c1115494a5c111413080004511740571216140506085f501c465147571b51505119141402511b5716571c511b0904121c030e061111050a0600110102055b0c0b0a070bNot Before08/05/2023, 00:53Not After07/05/2024, 00:53SubjectCN=522434573635311625120101053d123d53210e113336571014061e5d361525000421,POSTALCODE=10407,ST=0b1c1115005f5c4e0f020a1000040b144b0114+ST=0b1c1115494a5c111413080004511740571216140506085f501c465147571b51505119141402511b5716571c511b0904121c030e061111050a0600110102055b0c0b0a070b09:9e:1e:4f:09:df:67:13:9e:24:ea:cd:22:82:18:20:ce:56:20:31:01:7b:9f:93:c5:03:d8:cd:19:2a:f9:d8Signer
Actual PE Digest09:9e:1e:4f:09:df:67:13:9e:24:ea:cd:22:82:18:20:ce:56:20:31:01:7b:9f:93:c5:03:d8:cd:19:2a:f9:d8Digest Algorithmsha256PE Digest MatchestrueSignature Validations
TrustedfalseVerification
Signing CertificateCN=522434573635311625120101053d123d53210e113336571014061e5d361525000421,POSTALCODE=10407,ST=0b1c1115005f5c4e0f020a1000040b144b0114+ST=0b1c1115494a5c111413080004511740571216140506085f501c465147571b51505119141402511b5716571c511b0904121c030e061111050a0600110102055b0c0b0a070b03/05/2023, 12:02 Valid: false
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDefaultCommConfigW
SetWaitableTimer
ReadConsoleA
GetConsoleAliasA
GetCurrentActCtx
GetSystemWindowsDirectoryW
QueryDosDeviceA
GetProfileStringW
WaitForSingleObject
CancelWaitableTimer
AddConsoleAliasW
GetModuleHandleW
EnumCalendarInfoExW
IsBadReadPtr
GetNumberFormatA
ReadConsoleW
GetWindowsDirectoryA
EnumTimeFormatsA
EnumTimeFormatsW
CreateActCtxW
EnumResourceTypesA
SetProcessPriorityBoost
GetCalendarInfoA
HeapCreate
FindNextVolumeW
Beep
WriteConsoleW
ReplaceFileW
GetModuleFileNameW
lstrlenW
GlobalUnlock
GetConsoleAliasesW
GetLastError
lstrlenA
GetProcAddress
VirtualAlloc
CreateConsoleScreenBuffer
BeginUpdateResourceW
SetComputerNameA
LoadLibraryA
InterlockedExchangeAdd
LocalAlloc
FindFirstVolumeMountPointW
IsSystemResumeAutomatic
RemoveDirectoryW
WriteProfileSectionW
AddAtomA
SetConsoleCursorInfo
GetModuleHandleA
GetConsoleTitleW
EnumDateFormatsW
GetShortPathNameW
GetDiskFreeSpaceExW
FindAtomW
GetWindowsDirectoryW
DeleteTimerQueueTimer
GetTempPathA
GetConsoleSelectionInfo
EnumSystemLocalesW
CreateFileA
CloseHandle
GetConsoleOutputCP
WriteConsoleA
FlushFileBuffers
SetProcessAffinityMask
GetTempFileNameW
GetComputerNameA
GetLongPathNameW
GetConsoleMode
GetConsoleCP
InterlockedIncrement
InterlockedDecrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapAlloc
MultiByteToWideChar
GetStartupInfoW
RaiseException
RtlUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
HeapFree
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
VirtualFree
HeapReAlloc
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
ReadFile
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
SetHandleCount
GetFileType
GetStartupInfoA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapSize
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
InitializeCriticalSectionAndSpinCount
SetFilePointer
SetStdHandle
LCMapStringA
WideCharToMultiByte
LCMapStringW
user32
SetCaretPos
ToAsciiEx
ChangeMenuW
SetParent
CreateAcceleratorTableW
GetClassInfoExW
GetWindowLongA
GetSysColorBrush
gdi32
GetCharABCWidthsFloatW
GetCharWidthA
GetColorAdjustment
winhttp
WinHttpOpen
Sections
.text Size: 4.1MB - Virtual size: 4.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 2.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 146KB - Virtual size: 2.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ