Static task
static1
General
-
Target
5d905f4558a71be2c00041b90cd8bbbc401065d20fca9de8b52ea97335bc6769
-
Size
4.2MB
-
MD5
8139e97e2f25439fdeb79ac05d3b27d6
-
SHA1
287ef7df6ce87fa6149002907d442bcfebcc1ea7
-
SHA256
5d905f4558a71be2c00041b90cd8bbbc401065d20fca9de8b52ea97335bc6769
-
SHA512
b68c1373f1e241a401dd3c3675fc4bceabcb7f3215a501cc83479bb9541952c0f8a037340594a796a62da54af99e893f9c2897c01be5561b80e74d294e2ee0e3
-
SSDEEP
98304:s3JFIAKVAJkFR30tizXZEoLajtjwN5oQIWlzMLFQdb/ewU:SqAKWJIEszXOIaMkQIWyaI
Malware Config
Signatures
Files
-
5d905f4558a71be2c00041b90cd8bbbc401065d20fca9de8b52ea97335bc6769.exe windows x86
af40ca862bb560756a6239b041d2950a
Code Sign
d4:13:3b:a1:02:d9:6b:da:54:e7:74:0f:8b:43:ba:beCertificate
IssuerCN=522036264b3c07530c0910253d36220330152b1b14292e1a512d092b0b3746071333,POSTALCODE=10700,ST=0b1c1115005f5c4e0f020a1000040b144b1e0e06000a14+ST=0b1c1115494a5c031c0b02081a1750475310151f070b57051217441d47031d1512195d501615110b570d0a17550b1209150a45131d1315075a001044160a055b0c0b0a070bNot Before08-06-2023 07:43Not After07-06-2024 07:43SubjectCN=522036264b3c07530c0910253d36220330152b1b14292e1a512d092b0b3746071333,POSTALCODE=10700,ST=0b1c1115005f5c4e0f020a1000040b144b1e0e06000a14+ST=0b1c1115494a5c031c0b02081a1750475310151f070b57051217441d47031d1512195d501615110b570d0a17550b1209150a45131d1315075a001044160a055b0c0b0a070bd5:3d:9e:9f:50:f0:7b:20:46:c7:38:33:47:0b:fc:8c:5d:7b:9a:9f:13:c1:2c:1a:13:34:12:88:87:98:35:69Signer
Actual PE Digestd5:3d:9e:9f:50:f0:7b:20:46:c7:38:33:47:0b:fc:8c:5d:7b:9a:9f:13:c1:2c:1a:13:34:12:88:87:98:35:69Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetMailslotInfo
GetLogicalDriveStringsW
WritePrivateProfileSectionA
FreeEnvironmentStringsA
GetProcessPriorityBoost
GetTickCount
EnumCalendarInfoExW
WaitNamedPipeW
EnumTimeFormatsW
GetVolumePathNameW
GetPrivateProfileIntA
GetSystemPowerStatus
GetCalendarInfoA
GetProcessHandleCount
GetConsoleAliasExesLengthW
LeaveCriticalSection
GetFileAttributesW
GetModuleFileNameW
GetShortPathNameA
DeleteFiber
GetProcAddress
MoveFileW
SetComputerNameA
SearchPathA
GetDiskFreeSpaceW
InterlockedIncrement
LoadLibraryA
InterlockedExchangeAdd
LocalAlloc
DeleteTimerQueue
SetCalendarInfoW
MoveFileA
BuildCommDCBAndTimeoutsW
FindFirstVolumeMountPointW
IsSystemResumeAutomatic
OpenJobObjectW
GetPrivateProfileStructA
FindFirstVolumeMountPointA
EnumDateFormatsA
GetModuleHandleA
CreateMutexA
FindNextFileW
GetConsoleTitleW
EnumDateFormatsW
CompareStringA
GetShortPathNameW
SetThreadAffinityMask
SetFileShortNameA
FindAtomW
GetVolumeNameForVolumeMountPointW
DeleteFileW
EnumSystemLocalesW
AreFileApisANSI
GetDriveTypeW
OpenWaitableTimerA
GetStringTypeA
GetLastError
HeapFree
DeleteFileA
WideCharToMultiByte
HeapReAlloc
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RaiseException
HeapAlloc
IsProcessorFeaturePresent
HeapCreate
EnterCriticalSection
SetFilePointer
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
DecodePointer
TerminateProcess
GetCurrentProcess
GetCPInfo
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
SetLastError
GetCurrentThreadId
ExitProcess
WriteFile
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
RtlUnwind
LCMapStringW
MultiByteToWideChar
GetStringTypeW
HeapSize
LoadLibraryW
WriteConsoleW
CloseHandle
CreateFileW
gdi32
GetCharABCWidthsW
SelectObject
Sections
.text Size: 75KB - Virtual size: 74KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4.0MB - Virtual size: 44.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 130KB - Virtual size: 129KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ