Static task
static1
General
-
Target
91ca0c2f042756284d426cf8146c481e5c430a47891e44544acbd6e8c688d180
-
Size
4.2MB
-
MD5
a630c652c3a4203b80e18b3462940cfb
-
SHA1
3a1a40616e99196b27fd1798882212360fbb2e93
-
SHA256
91ca0c2f042756284d426cf8146c481e5c430a47891e44544acbd6e8c688d180
-
SHA512
3cb7fdec4b7fa2a7b731f35a6bac2a3050d7fc8c1736d481b0d9c06c899fb16fc8b2868542893c0416a35d78f35eef8870af5b9efa12bf2aed7d69674b7290d4
-
SSDEEP
98304:Eih7wWr42XaObQtm+2chyikeqIe7hsjdDHqAtXUj5x:x7n4mbQt2ckb5Cjli5x
Malware Config
Signatures
Files
-
91ca0c2f042756284d426cf8146c481e5c430a47891e44544acbd6e8c688d180.exe windows x86
712790218c9933affd5446ad133f0f83
Code Sign
77:9b:6c:3a:08:8a:ef:22:41:ba:b7:ef:47:ac:e2Certificate
IssuerCN=5225102f0434382d242811523e2627225c0650271700133f52163721402002312055,POSTALCODE=10307,ST=0b1c1115005f5c4e0f020a1000040b144b1c0e1a+ST=0b1c1115494a5c041c1150080c17090704050e005006511f0214001f1518010656090d0252450d0309185403131b5207441f1b0d41130a081a5013450802055b0c0b0a070bNot Before12/05/2023, 13:05Not After11/05/2024, 13:05SubjectCN=5225102f0434382d242811523e2627225c0650271700133f52163721402002312055,POSTALCODE=10307,ST=0b1c1115005f5c4e0f020a1000040b144b1c0e1a+ST=0b1c1115494a5c041c1150080c17090704050e005006511f0214001f1518010656090d0252450d0309185403131b5207441f1b0d41130a081a5013450802055b0c0b0a070b09:cd:c4:cc:f6:e1:38:c6:bf:0a:40:bb:ae:d9:60:a6:19:6d:ea:2e:a7:e4:f0:3c:cd:dd:b4:15:d7:f9:79:09Signer
Actual PE Digest09:cd:c4:cc:f6:e1:38:c6:bf:0a:40:bb:ae:d9:60:a6:19:6d:ea:2e:a7:e4:f0:3c:cd:dd:b4:15:d7:f9:79:09Digest Algorithmsha256PE Digest MatchestrueSignature Validations
TrustedfalseVerification
Signing CertificateCN=5225102f0434382d242811523e2627225c0650271700133f52163721402002312055,POSTALCODE=10307,ST=0b1c1115005f5c4e0f020a1000040b144b1c0e1a+ST=0b1c1115494a5c041c1150080c17090704050e005006511f0214001f1518010656090d0252450d0309185403131b5207441f1b0d41130a081a5013450802055b0c0b0a070b11/05/2023, 10:06 Valid: false
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetDefaultCommConfigA
EnumCalendarInfoA
AllocConsole
GetProfileIntW
GetConsoleAliasExesLengthA
InterlockedIncrement
InterlockedDecrement
GetProfileSectionA
SetComputerNameW
GetSystemDefaultLCID
GetTickCount
GetSystemTimeAsFileTime
GetConsoleTitleA
ReadConsoleW
TzSpecificLocalTimeToSystemTime
GetDriveTypeA
GlobalAlloc
LoadLibraryW
GetCalendarInfoW
SetVolumeMountPointA
GetFileAttributesW
WriteConsoleW
SetSystemPowerState
GetModuleFileNameW
CreateFileW
GetVolumePathNameA
FindNextVolumeMountPointW
GetStringTypeExA
GetPrivateProfileIntW
GlobalFix
GetCurrentDirectoryW
SetLastError
GetProcAddress
CreateJobSet
MoveFileW
RemoveDirectoryA
SearchPathA
GetTempFileNameA
SetFileApisToOEM
LoadLibraryA
SetCalendarInfoW
FindFirstVolumeMountPointW
BeginUpdateResourceA
AddAtomA
GlobalWire
FindNextFileA
CreateIoCompletionPort
GetModuleHandleA
lstrcatW
FreeEnvironmentStringsW
EnumDateFormatsW
CompareStringA
WaitForDebugEvent
SetThreadAffinityMask
FileTimeToLocalFileTime
DeleteAtom
MoveFileWithProgressW
EnumSystemLocalesW
DeleteFileA
ReleaseActCtx
GetVolumeNameForVolumeMountPointA
EncodePointer
DecodePointer
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetLastError
HeapFree
GetModuleHandleW
ExitProcess
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RaiseException
RtlUnwind
HeapAlloc
WideCharToMultiByte
LCMapStringW
MultiByteToWideChar
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
IsProcessorFeaturePresent
HeapCreate
HeapSize
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
InitializeCriticalSectionAndSpinCount
GetLocaleInfoW
WriteFile
GetStdHandle
GetModuleFileNameA
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetCurrentProcessId
GetACP
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeW
HeapReAlloc
SetFilePointer
GetConsoleCP
GetConsoleMode
SetStdHandle
FlushFileBuffers
CloseHandle
advapi32
ReadEventLogW
Sections
.text Size: 106KB - Virtual size: 106KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4.0MB - Virtual size: 4.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pepuwoc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 105KB - Virtual size: 4.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ