Static task
static1
General
-
Target
d6b6712337754cea07e4876ca66416e97de96c99f62a4282d4cbe3098771a505
-
Size
4.1MB
-
MD5
a72a41ec3c2220dba764e783375eded1
-
SHA1
f0725e7c8df230f10127fa7ecd1026f356006240
-
SHA256
d6b6712337754cea07e4876ca66416e97de96c99f62a4282d4cbe3098771a505
-
SHA512
1ae146ad38762f47a751fafc69c61e7904ffa4f65b68c2620f4f97839afcf4cb25327c2c0c12723f364cf2e0ff91f089ba138d82e41fc48bc25c80d1afa0bf82
-
SSDEEP
98304:xC/m3LCW6xIWzRFLPLtNu49e8LiSZOvmDifctVFtHjm9t:xC/m3WRpNu9SYvAifcBq
Malware Config
Signatures
Files
-
d6b6712337754cea07e4876ca66416e97de96c99f62a4282d4cbe3098771a505.exe windows x86
73f55c9a8ec43dc84ad4d9211db141b3
Code Sign
b7:bd:62:76:bd:42:51:b6:69:ec:9c:a5:e9:a2:85:1bCertificate
IssuerCN=522434573635311625120101053d123d53210e113336571014061e5d361525000421,POSTALCODE=10307,ST=0b1c1115005f5c4e0f020a1000040b144b0114+ST=0b1c1115494a5c111413080004511740571216140506085f501c465147571b51505119141402511b5716571c511b0904121c030e061111050a0600110102055b0c0b0a070bNot Before06/06/2023, 07:47Not After05/06/2024, 07:47SubjectCN=522434573635311625120101053d123d53210e113336571014061e5d361525000421,POSTALCODE=10307,ST=0b1c1115005f5c4e0f020a1000040b144b0114+ST=0b1c1115494a5c111413080004511740571216140506085f501c465147571b51505119141402511b5716571c511b0904121c030e061111050a0600110102055b0c0b0a070b2c:f3:06:74:22:7f:40:29:7a:60:12:44:9d:8f:4e:17:e9:c3:e8:58:3c:76:6a:8e:a6:70:de:90:56:3c:97:6fSigner
Actual PE Digest2c:f3:06:74:22:7f:40:29:7a:60:12:44:9d:8f:4e:17:e9:c3:e8:58:3c:76:6a:8e:a6:70:de:90:56:3c:97:6fDigest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedDecrement
SetMailslotInfo
GetSystemWindowsDirectoryW
FreeEnvironmentStringsA
GetProcessPriorityBoost
EnumCalendarInfoExW
WaitNamedPipeW
EnumTimeFormatsW
GetDriveTypeA
GetProcessTimes
GetVolumePathNameW
GetCalendarInfoA
GetFileAttributesA
WriteConsoleW
SetSystemPowerState
GetModuleFileNameW
CompareStringW
GetShortPathNameA
EnumSystemLocalesA
GetPrivateProfileIntW
DeleteFiber
GetLastError
GetProcAddress
InterlockedIncrement
HeapSize
SetComputerNameA
EnterCriticalSection
SearchPathA
OpenWaitableTimerA
LoadLibraryA
Process32FirstW
GetProcessId
LocalAlloc
SetCalendarInfoW
BuildCommDCBAndTimeoutsW
IsSystemResumeAutomatic
AddAtomW
OpenJobObjectW
GetPrivateProfileStructA
FindFirstVolumeMountPointA
EnumDateFormatsA
CreateIoCompletionPort
GetModuleHandleA
CancelTimerQueueTimer
FreeEnvironmentStringsW
FindNextFileW
SetFileShortNameA
FindAtomW
AreFileApisANSI
GetConsoleAliasExesLengthA
AttachConsole
GetVolumeNameForVolumeMountPointA
HeapFree
DeleteFileA
WideCharToMultiByte
HeapReAlloc
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RaiseException
HeapAlloc
IsProcessorFeaturePresent
HeapCreate
LeaveCriticalSection
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
DecodePointer
TerminateProcess
GetCurrentProcess
SetFilePointer
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
SetLastError
GetCurrentThreadId
ExitProcess
WriteFile
GetModuleFileNameA
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
GetConsoleCP
GetConsoleMode
RtlUnwind
SetStdHandle
FlushFileBuffers
LCMapStringW
MultiByteToWideChar
GetStringTypeW
LoadLibraryW
CloseHandle
CreateFileW
gdi32
GetCharABCWidthsA
SelectObject
Sections
.text Size: 70KB - Virtual size: 70KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4.0MB - Virtual size: 44.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 83KB - Virtual size: 83KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ