Static task
static1
General
-
Target
78445ba2c543c6a78974c908ff9d48a17a5206b30de438352c863fa4cdf7efd3
-
Size
4.2MB
-
MD5
8e106a5bd20583460af9a881833046c3
-
SHA1
be8f2e4cada4731b76845abf3e91ae9a782b7816
-
SHA256
78445ba2c543c6a78974c908ff9d48a17a5206b30de438352c863fa4cdf7efd3
-
SHA512
3684708b2997ba4c5084f3f89190a64ef2c7f12dff66be682ea43859e35ca86db91a8c0ac647ff83bbbf45b0be4a1ee0d49e4e6e61f507c6b896fbb63181e45e
-
SSDEEP
98304:E9zsQ68NZJAUQvS0gtKx7M125D/72Q5Z9pvPsrDHphmEIUQTp:E9zDHXJT0SKx71Dj2SnqJNpi
Malware Config
Signatures
Files
-
78445ba2c543c6a78974c908ff9d48a17a5206b30de438352c863fa4cdf7efd3.exe windows x86
c37a1f908dc8ba7c67223959bc2021cd
Code Sign
04:1c:14:a2:97:4b:f9:30:7c:6b:eb:f3:5f:4e:92:d8Certificate
IssuerCN=52263d520931235736570a2402571c4021122b211102515e242235323619033a0b11,POSTALCODE=10407,ST=0b1c1115005f5c4e1802161701040e1609164f1c0010+ST=0b1c1115494a5c5305080e17100e0340021d1116090d510a0d0c455712130f510c06110f020b0a100346090b065b0e06410b06530c151c1b191457400b12055b0c0b0a070bNot Before21/05/2023, 08:23Not After20/05/2024, 08:23SubjectCN=52263d520931235736570a2402571c4021122b211102515e242235323619033a0b11,POSTALCODE=10407,ST=0b1c1115005f5c4e1802161701040e1609164f1c0010+ST=0b1c1115494a5c5305080e17100e0340021d1116090d510a0d0c455712130f510c06110f020b0a100346090b065b0e06410b06530c151c1b191457400b12055b0c0b0a070b40:25:c8:40:af:b9:b9:53:ca:94:9c:40:95:c0:29:af:b8:cc:24:d1:8a:da:3b:f5:e1:55:c3:17:e9:0d:15:7fSigner
Actual PE Digest40:25:c8:40:af:b9:b9:53:ca:94:9c:40:95:c0:29:af:b8:cc:24:d1:8a:da:3b:f5:e1:55:c3:17:e9:0d:15:7fDigest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommState
InterlockedDecrement
CreateJobObjectW
InterlockedCompareExchange
AddConsoleAliasW
SetEvent
GetProcessPriorityBoost
GetModuleHandleW
GetConsoleTitleA
ReadConsoleW
GetWindowsDirectoryA
InitializeCriticalSection
GlobalAlloc
IsValidLocale
FatalAppExitW
IsBadCodePtr
GetSystemWindowsDirectoryA
GetVersionExW
GlobalFlags
DnsHostnameToComputerNameW
FindNextVolumeW
GetConsoleAliasW
ReplaceFileW
IsDBCSLeadByte
CreateActCtxA
GetTempPathW
GetStringTypeExA
AllocConsole
GetLogicalDriveStringsA
OpenMutexW
GetLastError
SetLastError
GetProcAddress
AttachConsole
VirtualAlloc
GetTempFileNameA
LoadLibraryA
CreateFileMappingW
OpenEventA
VirtualLock
FindAtomA
GetTapeParameters
GetModuleFileNameA
GetDefaultCommConfigA
FindFirstVolumeMountPointA
GetModuleHandleA
GetConsoleTitleW
GetConsoleCursorInfo
WaitForDebugEvent
ScrollConsoleScreenBufferA
_lopen
AddConsoleAliasA
ReadConsoleOutputCharacterW
EnumCalendarInfoExA
GetLocaleInfoA
GetConsoleAliasesLengthW
GetDateFormatW
lstrlenA
SetThreadContext
WideCharToMultiByte
InterlockedIncrement
InterlockedExchange
MultiByteToWideChar
Sleep
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
HeapAlloc
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
GetStartupInfoA
GetCPInfo
RtlUnwind
RaiseException
LCMapStringW
LCMapStringA
GetStringTypeW
HeapCreate
VirtualFree
HeapReAlloc
ExitProcess
WriteFile
GetStdHandle
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetStringTypeA
HeapSize
GetACP
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
EnumSystemLocalesA
InitializeCriticalSectionAndSpinCount
GetLocaleInfoW
gdi32
EnumFontsW
GetCharABCWidthsI
GetCharABCWidthsFloatW
GetCharWidthI
GetCharWidthA
Sections
.text Size: 4.1MB - Virtual size: 4.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 2.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 75KB - Virtual size: 2.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ