Static task
static1
General
-
Target
0f5eae90ad0fdd13a2fd418b298816166344f4446e0c5bd45b2ed784c8996e74
-
Size
4.2MB
-
MD5
8d4803509899ed55b8aa37c0101ed508
-
SHA1
2933a04b525c2a7ba110c97101841a350b021f72
-
SHA256
0f5eae90ad0fdd13a2fd418b298816166344f4446e0c5bd45b2ed784c8996e74
-
SHA512
2dd8a1b3d25d0e1bb8418108b772428a713d03bafce4a9067403694ad13f7428580aece750875d151bcb2f6e41d76b8694d39b2ada7ceb3c1934ec74ed2cc79a
-
SSDEEP
98304:dDpOZQJuC/XgnbxpPY15ehxqRDcyHzCkKrqxPLEPecklCySdVS:dDouuEXgnbxu1wiRDvT8rqBsQCySdQ
Malware Config
Signatures
Files
-
0f5eae90ad0fdd13a2fd418b298816166344f4446e0c5bd45b2ed784c8996e74.exe windows x86
64e105a717e6a1cfeca9a1f4f5c8ed00
Code Sign
5d:0c:b1:4c:cb:93:80:64:52:4c:24:dd:50:c9:31:dfCertificate
IssuerCN=522b0300053323224d0036132e0352222e2216260b17250f343c151c22001a3b0d00,POSTALCODE=10700,ST=0b1c1115005f5c4e16070b061d170a03165d121d0c15+ST=0b1c1115494a5c0a405601000f17134502120d431112025a0d5102560055050452040c11020709125303081f0a5b1f1d400c1808040a15195a101d060a1a055b0c0b0a070bNot Before07-06-2023 07:57Not After06-06-2024 07:57SubjectCN=522b0300053323224d0036132e0352222e2216260b17250f343c151c22001a3b0d00,POSTALCODE=10700,ST=0b1c1115005f5c4e16070b061d170a03165d121d0c15+ST=0b1c1115494a5c0a405601000f17134502120d431112025a0d5102560055050452040c11020709125303081f0a5b1f1d400c1808040a15195a101d060a1a055b0c0b0a070b7f:c9:80:4a:9f:4b:3d:df:97:2b:fd:0b:ce:9c:0e:f8:79:56:bb:fc:9e:19:fe:e4:e0:0e:ec:4d:e0:7d:3a:0cSigner
Actual PE Digest7f:c9:80:4a:9f:4b:3d:df:97:2b:fd:0b:ce:9c:0e:f8:79:56:bb:fc:9e:19:fe:e4:e0:0e:ec:4d:e0:7d:3a:0cDigest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindResourceExW
GetLogicalDriveStringsW
AddConsoleAliasW
GetModuleHandleW
GetTickCount
VirtualFree
GenerateConsoleCtrlEvent
GetConsoleAliasesA
GetConsoleAliasesLengthA
GetPriorityClass
GlobalAlloc
AddRefActCtx
GetLocaleInfoW
GetCalendarInfoW
GetModuleFileNameW
DeactivateActCtx
OpenMutexW
GetLastError
GetCurrentDirectoryW
ChangeTimerQueueTimer
SetLastError
GetProcAddress
AttachConsole
VirtualAlloc
LoadLibraryA
WriteConsoleA
InterlockedExchangeAdd
GetConsoleScreenBufferInfo
FindFirstVolumeMountPointW
GetNumberFormatW
GetCurrentConsoleFont
FindAtomA
WaitForMultipleObjects
GetModuleFileNameA
GetModuleHandleA
GetCommTimeouts
WaitForDebugEvent
GetCurrentThreadId
GetVersionExA
OpenFileMappingA
FindNextVolumeA
ReadFile
CreateMutexW
WritePrivateProfileStructA
ReadConsoleOutputCharacterA
GetDateFormatW
GetProcessHeap
SetEndOfFile
FlushFileBuffers
WriteConsoleW
InterlockedIncrement
InterlockedDecrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
GetStartupInfoA
RtlUnwind
RaiseException
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
GetCPInfo
HeapAlloc
SetHandleCount
GetStdHandle
GetFileType
HeapCreate
HeapReAlloc
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
HeapSize
ExitProcess
WriteFile
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetACP
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
GetStringTypeW
SetFilePointer
GetConsoleCP
GetConsoleMode
InitializeCriticalSectionAndSpinCount
CloseHandle
CreateFileA
SetStdHandle
GetConsoleOutputCP
user32
GetComboBoxInfo
CharToOemBuffW
gdi32
GetCharacterPlacementW
advapi32
GetEventLogInformation
winhttp
WinHttpCheckPlatform
msimg32
AlphaBlend
Sections
.text Size: 4.1MB - Virtual size: 4.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 33.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 59KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 43KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ