Static task
static1
General
-
Target
b83065f546c800356c4bfd2931dbe68ca84d802ccc4dd49f008291abebb1e16e
-
Size
4.2MB
-
MD5
449ebf561169c01590b3fecfe47bbccd
-
SHA1
6847fec67c31d859c52ffa3e1cbde0b2b667393c
-
SHA256
b83065f546c800356c4bfd2931dbe68ca84d802ccc4dd49f008291abebb1e16e
-
SHA512
857b9639a751a1114bbda6c4d741977153391cabdd59e88c124d96320c018985b42311bf8aacc79b6ce21e4cddb119102817eb8718dfa1591f0e0ccc471cdc37
-
SSDEEP
98304:s9zsQ68NZJAUQvS0gtKx7M125D/72Q5Z9pvPsrDHphmEIUQT0:s9zDHXJT0SKx71Dj2SnqJNp7
Malware Config
Signatures
Files
-
b83065f546c800356c4bfd2931dbe68ca84d802ccc4dd49f008291abebb1e16e.exe windows x86
c37a1f908dc8ba7c67223959bc2021cd
Code Sign
3e:e7:92:d6:92:98:9c:cd:40:0a:54:2f:47:0e:c6:aaCertificate
IssuerCN=522a143c46533d0e442f37555c2422100a1455182550573d31351d0f013134332d19,POSTALCODE=10305,ST=0b1c1115005f5c4e1802161701040e1609164f161a0a16+ST=0b1c1115494a5c05125116195f151d00521f0d135111515d03161110070d03151709010f5103081c0b00040b545d06080b0b050e060b08091d5301090612055b0c0b0a070bNot Before21/05/2023, 08:17Not After20/05/2024, 08:17SubjectCN=522a143c46533d0e442f37555c2422100a1455182550573d31351d0f013134332d19,POSTALCODE=10305,ST=0b1c1115005f5c4e1802161701040e1609164f161a0a16+ST=0b1c1115494a5c05125116195f151d00521f0d135111515d03161110070d03151709010f5103081c0b00040b545d06080b0b050e060b08091d5301090612055b0c0b0a070b40:25:c8:40:af:b9:b9:53:ca:94:9c:40:95:c0:29:af:b8:cc:24:d1:8a:da:3b:f5:e1:55:c3:17:e9:0d:15:7fSigner
Actual PE Digest40:25:c8:40:af:b9:b9:53:ca:94:9c:40:95:c0:29:af:b8:cc:24:d1:8a:da:3b:f5:e1:55:c3:17:e9:0d:15:7fDigest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommState
InterlockedDecrement
CreateJobObjectW
InterlockedCompareExchange
AddConsoleAliasW
SetEvent
GetProcessPriorityBoost
GetModuleHandleW
GetConsoleTitleA
ReadConsoleW
GetWindowsDirectoryA
InitializeCriticalSection
GlobalAlloc
IsValidLocale
FatalAppExitW
IsBadCodePtr
GetSystemWindowsDirectoryA
GetVersionExW
GlobalFlags
DnsHostnameToComputerNameW
FindNextVolumeW
GetConsoleAliasW
ReplaceFileW
IsDBCSLeadByte
CreateActCtxA
GetTempPathW
GetStringTypeExA
AllocConsole
GetLogicalDriveStringsA
OpenMutexW
GetLastError
SetLastError
GetProcAddress
AttachConsole
VirtualAlloc
GetTempFileNameA
LoadLibraryA
CreateFileMappingW
OpenEventA
VirtualLock
FindAtomA
GetTapeParameters
GetModuleFileNameA
GetDefaultCommConfigA
FindFirstVolumeMountPointA
GetModuleHandleA
GetConsoleTitleW
GetConsoleCursorInfo
WaitForDebugEvent
ScrollConsoleScreenBufferA
_lopen
AddConsoleAliasA
ReadConsoleOutputCharacterW
EnumCalendarInfoExA
GetLocaleInfoA
GetConsoleAliasesLengthW
GetDateFormatW
lstrlenA
SetThreadContext
WideCharToMultiByte
InterlockedIncrement
InterlockedExchange
MultiByteToWideChar
Sleep
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
HeapAlloc
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
GetStartupInfoA
GetCPInfo
RtlUnwind
RaiseException
LCMapStringW
LCMapStringA
GetStringTypeW
HeapCreate
VirtualFree
HeapReAlloc
ExitProcess
WriteFile
GetStdHandle
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetStringTypeA
HeapSize
GetACP
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
EnumSystemLocalesA
InitializeCriticalSectionAndSpinCount
GetLocaleInfoW
gdi32
EnumFontsW
GetCharABCWidthsI
GetCharABCWidthsFloatW
GetCharWidthI
GetCharWidthA
Sections
.text Size: 4.1MB - Virtual size: 4.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 2.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 75KB - Virtual size: 2.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ