Static task
static1
General
-
Target
d707a2dd694692f1257af70e54c9d019ea3ab408b2e8496a8c42872430c354a7
-
Size
4.2MB
-
MD5
6ce5bd2788538b49c60a92698b8d56fa
-
SHA1
acbdc1bf84ff43a624c114e3efabc465c1253c93
-
SHA256
d707a2dd694692f1257af70e54c9d019ea3ab408b2e8496a8c42872430c354a7
-
SHA512
31e7845fe95edc3f5be843b330f500c0965dd936c53519dcf0789bae067efbbd02a62390523c5fd16ee4f2935fb0a5e058ef2e749d8635d83e06f517ec17c2e8
-
SSDEEP
98304:opjGb0Pg7YgkXMGp2wJncYbqkxEXKJX4478CQikEd6UOE:opjvTgAlp5Jcwr+aisdQjEQU1
Malware Config
Signatures
Files
-
d707a2dd694692f1257af70e54c9d019ea3ab408b2e8496a8c42872430c354a7.exe windows x86
cffb13fd9da7f89cf243dfbae0e78962
Code Sign
29:92:e2:bd:86:f3:44:ce:79:ce:c3:85:e2:35:dc:1cCertificate
IssuerCN=522434573635311625120101053d123d53210e113336571014061e5d361525000421,POSTALCODE=10802,ST=0b1c1115005f5c4e0f020a1000040b144b0114+ST=0b1c1115494a5c111413080004511740571216140506085f501c465147571b51505119141402511b5716571c511b0904121c030e061111050a0600110102055b0c0b0a070bNot Before06-06-2023 22:47Not After05-06-2024 22:47SubjectCN=522434573635311625120101053d123d53210e113336571014061e5d361525000421,POSTALCODE=10802,ST=0b1c1115005f5c4e0f020a1000040b144b0114+ST=0b1c1115494a5c111413080004511740571216140506085f501c465147571b51505119141402511b5716571c511b0904121c030e061111050a0600110102055b0c0b0a070bfb:64:c0:0e:13:12:3a:b2:22:c3:f5:ed:d2:03:9a:60:ef:aa:a7:f8:4d:51:73:b7:1a:fc:67:c6:f6:91:4f:0aSigner
Actual PE Digestfb:64:c0:0e:13:12:3a:b2:22:c3:f5:ed:d2:03:9a:60:ef:aa:a7:f8:4d:51:73:b7:1a:fc:67:c6:f6:91:4f:0aDigest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetMailslotInfo
GetLogicalDriveStringsW
WritePrivateProfileSectionA
GetSystemWindowsDirectoryW
FreeEnvironmentStringsA
GetProcessPriorityBoost
EnumCalendarInfoExW
GetConsoleTitleA
WaitNamedPipeW
EnumTimeFormatsW
GetVolumePathNameW
GetPrivateProfileIntA
GetSystemPowerStatus
GetCalendarInfoA
GetProcessHandleCount
GetConsoleAliasExesLengthW
LeaveCriticalSection
GetFileAttributesA
GetFileAttributesW
GetModuleFileNameW
GetShortPathNameA
DeleteFiber
SetLastError
GetProcAddress
HeapSize
MoveFileW
SetComputerNameA
InterlockedIncrement
GetDiskFreeSpaceW
OpenWaitableTimerA
LoadLibraryA
WriteConsoleA
GetProcessId
InterlockedExchangeAdd
LocalAlloc
DeleteTimerQueue
SetCalendarInfoW
BuildCommDCBAndTimeoutsW
FindFirstVolumeMountPointW
IsSystemResumeAutomatic
AddAtomW
OpenJobObjectW
GetPrivateProfileStructA
FindFirstVolumeMountPointA
EnumDateFormatsA
GetModuleHandleA
CreateMutexA
FindNextFileW
EnumDateFormatsW
CompareStringA
GetShortPathNameW
SetFileShortNameA
FindAtomW
GetVolumeNameForVolumeMountPointW
DeleteFileW
EnumSystemLocalesW
AreFileApisANSI
GetDriveTypeW
SearchPathA
GetStringTypeA
GetLastError
HeapFree
DeleteFileA
WideCharToMultiByte
HeapReAlloc
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RaiseException
HeapAlloc
IsProcessorFeaturePresent
HeapCreate
EnterCriticalSection
SetFilePointer
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
DecodePointer
TerminateProcess
GetCurrentProcess
GetCPInfo
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
GetCurrentThreadId
ExitProcess
WriteFile
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
RtlUnwind
LCMapStringW
MultiByteToWideChar
GetStringTypeW
LoadLibraryW
WriteConsoleW
CloseHandle
CreateFileW
gdi32
GetCharABCWidthsW
SelectObject
Sections
.text Size: 75KB - Virtual size: 75KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4.0MB - Virtual size: 44.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 107KB - Virtual size: 107KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ