Static task
static1
General
-
Target
6779fef33a976fbeed185868206a253fadba4513a6b951f6c7d9c951c29b3d19
-
Size
4.2MB
-
MD5
d00eb119346298effa8ee742cddf71e6
-
SHA1
cc1ef61937ffbe0b0202adf41b23650a055be6cc
-
SHA256
6779fef33a976fbeed185868206a253fadba4513a6b951f6c7d9c951c29b3d19
-
SHA512
137e2d761f64bcc7287a82315834b866fd5b2c40e1c7dbf06ba8167074e950f79998295f166b25f8721d55f1cb983a6aab79d59e580baee78a6726b4932cc6fb
-
SSDEEP
98304:GwxLTHiVfND5jI8y46oyWY2H3chRPWTrgRgGL/Yh55yv:GwxHode46pGHKwrgacy50
Malware Config
Signatures
Files
-
6779fef33a976fbeed185868206a253fadba4513a6b951f6c7d9c951c29b3d19.exe windows x86
64e105a717e6a1cfeca9a1f4f5c8ed00
Code Sign
11:aa:72:f8:78:63:02:1d:22:36:dc:cc:5a:46:a7:9bCertificate
IssuerCN=52263d520931235736570a2402571c4021122b211102515e242235323619033a0b11,POSTALCODE=10407,ST=0b1c1115005f5c4e1802161701040e1609164f1c0010+ST=0b1c1115494a5c5305080e17100e0340021d1116090d510a0d0c455712130f510c06110f020b0a100346090b065b0e06410b06530c151c1b191457400b12055b0c0b0a070bNot Before07-06-2023 04:39Not After06-06-2024 04:39SubjectCN=52263d520931235736570a2402571c4021122b211102515e242235323619033a0b11,POSTALCODE=10407,ST=0b1c1115005f5c4e1802161701040e1609164f1c0010+ST=0b1c1115494a5c5305080e17100e0340021d1116090d510a0d0c455712130f510c06110f020b0a100346090b065b0e06410b06530c151c1b191457400b12055b0c0b0a070b67:2c:45:96:1c:97:17:57:a1:ea:ca:44:e0:b1:14:a6:d4:a2:79:f1:bc:c0:41:95:80:98:7b:27:1e:b3:ce:e0Signer
Actual PE Digest67:2c:45:96:1c:97:17:57:a1:ea:ca:44:e0:b1:14:a6:d4:a2:79:f1:bc:c0:41:95:80:98:7b:27:1e:b3:ce:e0Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindResourceExW
GetLogicalDriveStringsW
AddConsoleAliasW
GetModuleHandleW
GetTickCount
VirtualFree
GenerateConsoleCtrlEvent
GetConsoleAliasesA
GetConsoleAliasesLengthA
GetPriorityClass
GlobalAlloc
AddRefActCtx
GetLocaleInfoW
GetCalendarInfoW
GetModuleFileNameW
DeactivateActCtx
OpenMutexW
GetLastError
GetCurrentDirectoryW
ChangeTimerQueueTimer
SetLastError
GetProcAddress
AttachConsole
VirtualAlloc
LoadLibraryA
WriteConsoleA
InterlockedExchangeAdd
GetConsoleScreenBufferInfo
FindFirstVolumeMountPointW
GetNumberFormatW
GetCurrentConsoleFont
FindAtomA
WaitForMultipleObjects
GetModuleFileNameA
GetModuleHandleA
GetCommTimeouts
WaitForDebugEvent
GetCurrentThreadId
GetVersionExA
OpenFileMappingA
FindNextVolumeA
ReadFile
CreateMutexW
WritePrivateProfileStructA
ReadConsoleOutputCharacterA
GetDateFormatW
GetProcessHeap
SetEndOfFile
FlushFileBuffers
WriteConsoleW
InterlockedIncrement
InterlockedDecrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
GetStartupInfoA
RtlUnwind
RaiseException
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
GetCPInfo
HeapAlloc
SetHandleCount
GetStdHandle
GetFileType
HeapCreate
HeapReAlloc
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
HeapSize
ExitProcess
WriteFile
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetACP
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
GetStringTypeW
SetFilePointer
GetConsoleCP
GetConsoleMode
InitializeCriticalSectionAndSpinCount
CloseHandle
CreateFileA
SetStdHandle
GetConsoleOutputCP
user32
GetComboBoxInfo
CharToOemBuffW
gdi32
GetCharacterPlacementW
advapi32
GetEventLogInformation
winhttp
WinHttpCheckPlatform
msimg32
AlphaBlend
Sections
.text Size: 4.1MB - Virtual size: 4.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 33.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 59KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ