Static task
static1
General
-
Target
7b7198956eaa048cbc9dec2ae9ffc44f067044875cdd899d90488cb5c387390e
-
Size
4.2MB
-
MD5
6e1d9fe2a9f06d07879f2e599f21bebb
-
SHA1
5eca699e9ed3064b75fef9357fa0f4698e74f527
-
SHA256
7b7198956eaa048cbc9dec2ae9ffc44f067044875cdd899d90488cb5c387390e
-
SHA512
4fae99c7615afeaef6ada48f2f9b42d386940a00877a132013a16446543b1d4be759b907abdb513a26a84f3dd622562f71729103c04ae58c00ff3bd7492fd6d7
-
SSDEEP
98304:GwxLTHiVfND5jI8y46oyWY2H3chRPWTrgRgGL/Yh55yC:GwxHode46pGHKwrgacy5R
Malware Config
Signatures
Files
-
7b7198956eaa048cbc9dec2ae9ffc44f067044875cdd899d90488cb5c387390e.exe windows x86
64e105a717e6a1cfeca9a1f4f5c8ed00
Code Sign
62:01:14:07:d6:9e:6b:97:72:de:89:e3:b0:fb:2c:fbCertificate
IssuerCN=522a1720000d011b430433013e102d3427142b4024102b2a13264116170e10372429,POSTALCODE=10307,ST=0b1c1115005f5c4e16070b061d170a034b100d1a1601+ST=0b1c1115494a5c53171153050a060e05131d031c1702195d090014094753050d0f011f15150b1f1c100c1507545c1d0e011f070501080c0e5e0b0e450c12055b0c0b0a070bNot Before07-06-2023 04:46Not After06-06-2024 04:46SubjectCN=522a1720000d011b430433013e102d3427142b4024102b2a13264116170e10372429,POSTALCODE=10307,ST=0b1c1115005f5c4e16070b061d170a034b100d1a1601+ST=0b1c1115494a5c53171153050a060e05131d031c1702195d090014094753050d0f011f15150b1f1c100c1507545c1d0e011f070501080c0e5e0b0e450c12055b0c0b0a070b67:2c:45:96:1c:97:17:57:a1:ea:ca:44:e0:b1:14:a6:d4:a2:79:f1:bc:c0:41:95:80:98:7b:27:1e:b3:ce:e0Signer
Actual PE Digest67:2c:45:96:1c:97:17:57:a1:ea:ca:44:e0:b1:14:a6:d4:a2:79:f1:bc:c0:41:95:80:98:7b:27:1e:b3:ce:e0Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindResourceExW
GetLogicalDriveStringsW
AddConsoleAliasW
GetModuleHandleW
GetTickCount
VirtualFree
GenerateConsoleCtrlEvent
GetConsoleAliasesA
GetConsoleAliasesLengthA
GetPriorityClass
GlobalAlloc
AddRefActCtx
GetLocaleInfoW
GetCalendarInfoW
GetModuleFileNameW
DeactivateActCtx
OpenMutexW
GetLastError
GetCurrentDirectoryW
ChangeTimerQueueTimer
SetLastError
GetProcAddress
AttachConsole
VirtualAlloc
LoadLibraryA
WriteConsoleA
InterlockedExchangeAdd
GetConsoleScreenBufferInfo
FindFirstVolumeMountPointW
GetNumberFormatW
GetCurrentConsoleFont
FindAtomA
WaitForMultipleObjects
GetModuleFileNameA
GetModuleHandleA
GetCommTimeouts
WaitForDebugEvent
GetCurrentThreadId
GetVersionExA
OpenFileMappingA
FindNextVolumeA
ReadFile
CreateMutexW
WritePrivateProfileStructA
ReadConsoleOutputCharacterA
GetDateFormatW
GetProcessHeap
SetEndOfFile
FlushFileBuffers
WriteConsoleW
InterlockedIncrement
InterlockedDecrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
GetStartupInfoA
RtlUnwind
RaiseException
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
GetCPInfo
HeapAlloc
SetHandleCount
GetStdHandle
GetFileType
HeapCreate
HeapReAlloc
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
HeapSize
ExitProcess
WriteFile
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetACP
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
GetStringTypeW
SetFilePointer
GetConsoleCP
GetConsoleMode
InitializeCriticalSectionAndSpinCount
CloseHandle
CreateFileA
SetStdHandle
GetConsoleOutputCP
user32
GetComboBoxInfo
CharToOemBuffW
gdi32
GetCharacterPlacementW
advapi32
GetEventLogInformation
winhttp
WinHttpCheckPlatform
msimg32
AlphaBlend
Sections
.text Size: 4.1MB - Virtual size: 4.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 33.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 59KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ