Static task
static1
General
-
Target
1366ff4051d6b98bc23f687b5cb83d18ddbea3c3f6da60e82f0d54fcdd4445d2
-
Size
4.2MB
-
MD5
b006b3ce33776d7c884f5de7d2423140
-
SHA1
8c6c2c359be9f7f56e86b99741c1ff91a419885a
-
SHA256
1366ff4051d6b98bc23f687b5cb83d18ddbea3c3f6da60e82f0d54fcdd4445d2
-
SHA512
ce47aafaa8bf0bd7b647bf95f03f852532bebf257c53a29b06823e94d78186bac97fb1c5fb8c7db158279be61da3370d30ec0fe1d77e743d4817b67bd115fadf
-
SSDEEP
98304:jGfS5xhZflk2RkezkAikjGL+EJgyvSo4UfvDcvah/am:WSRZeykAikaL+Eeysm/X
Malware Config
Signatures
Files
-
1366ff4051d6b98bc23f687b5cb83d18ddbea3c3f6da60e82f0d54fcdd4445d2.exe windows x86
5ea1866af0e097b7b73a6d1cadb8810b
Code Sign
dc:7b:96:b5:9e:9f:33:d6:24:e7:8e:ae:02:25:3e:9eCertificate
IssuerCN=522036264b3c07530c0910253d36220330152b1b14292e1a512d092b0b3746071333,POSTALCODE=10307,ST=0b1c1115005f5c4e0f020a1000040b144b1e0e06000a14+ST=0b1c1115494a5c031c0b02081a1750475310151f070b57051217441d47031d1512195d501615110b570d0a17550b1209150a45131d1315075a001044160a055b0c0b0a070bNot Before26/05/2023, 19:36Not After25/05/2024, 19:36SubjectCN=522036264b3c07530c0910253d36220330152b1b14292e1a512d092b0b3746071333,POSTALCODE=10307,ST=0b1c1115005f5c4e0f020a1000040b144b1e0e06000a14+ST=0b1c1115494a5c031c0b02081a1750475310151f070b57051217441d47031d1512195d501615110b570d0a17550b1209150a45131d1315075a001044160a055b0c0b0a070bca:e6:7d:6d:c8:06:9b:15:64:23:ad:35:ce:53:b9:45:48:e6:13:8e:87:78:ee:d7:ed:58:e1:de:af:57:da:42Signer
Actual PE Digestca:e6:7d:6d:c8:06:9b:15:64:23:ad:35:ce:53:b9:45:48:e6:13:8e:87:78:ee:d7:ed:58:e1:de:af:57:da:42Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetConsoleAliasA
WaitForSingleObject
CancelWaitableTimer
AddConsoleAliasW
_lclose
GetProcessPriorityBoost
GetTickCount
IsBadReadPtr
GetConsoleTitleA
CancelDeviceWakeupRequest
WriteFile
GlobalAlloc
GetLocaleInfoW
FreeConsole
GetVersionExW
GlobalFlags
GetNamedPipeInfo
FindNextVolumeW
MulDiv
ReplaceFileW
GetModuleFileNameW
CreateActCtxA
GetStringTypeExA
CreateJobObjectA
GetCommState
GetStdHandle
GetLogicalDriveStringsA
GetLastError
ReadConsoleOutputCharacterA
GetProcAddress
AttachConsole
GetLongPathNameA
VirtualAlloc
EnterCriticalSection
_hwrite
LoadLibraryA
OpenMutexA
InterlockedExchangeAdd
GetFileType
CreateFileMappingW
FindFirstVolumeMountPointW
CreateEventW
lstrcmpiW
GetModuleHandleA
RequestWakeupLatency
GetFileAttributesExW
SetProcessShutdownParameters
_lopen
FindAtomW
DebugBreak
GetConsoleAliasesLengthW
lstrlenA
WritePrivateProfileStructA
GetProfileIntA
GetTempFileNameW
GetCommandLineA
GetStartupInfoA
RaiseException
RtlUnwind
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
HeapFree
WideCharToMultiByte
SetHandleCount
DeleteCriticalSection
LeaveCriticalSection
GetModuleHandleW
Sleep
ExitProcess
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapCreate
VirtualFree
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapReAlloc
SetFilePointer
GetConsoleCP
GetConsoleMode
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
InitializeCriticalSectionAndSpinCount
HeapSize
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
FlushFileBuffers
CreateFileA
CloseHandle
user32
CharLowerBuffA
gdi32
GetCharWidthW
EnumFontsW
GetCharABCWidthsFloatW
advapi32
MapGenericMask
Sections
.text Size: 4.0MB - Virtual size: 4.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 2.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 108KB - Virtual size: 2.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ