Static task
static1
General
-
Target
d966ce5caba50f1d0404202cfec1b2180590376ee21f833546ce4ceca309d895
-
Size
4.2MB
-
MD5
7269a1678bcd9b19944480d1a42d3af0
-
SHA1
33a7708f322815fdf30732dc45f3fc94afbfb43f
-
SHA256
d966ce5caba50f1d0404202cfec1b2180590376ee21f833546ce4ceca309d895
-
SHA512
eecefa1ed992b27a005cf5a86e8ed60289ca5ef09cb255b0eabcd4e031f9f1b345104740952f0c708fafdd0ea9e7f17ff79bda4f49042250d8421b4da3e0e7fd
-
SSDEEP
98304:Q/5S+b1Z/p6oQSInErfLJd2o/OVdeUy7NtwW:QBnTENnKJ0ZVk1BtwW
Malware Config
Signatures
Files
-
d966ce5caba50f1d0404202cfec1b2180590376ee21f833546ce4ceca309d895.exe windows x86
078c527316e58c8f8358ebd022c4bbdf
Code Sign
5b:78:07:1c:19:22:aa:ce:27:cf:10:92:ab:ac:67:ebCertificate
IssuerCN=525d0b323423120e110456060e332e32311412140236333d57310b361108382b0633,POSTALCODE=10802,ST=0b1c1115005f5c4ea5ddb5d9b9e5b4f74ba2e1a4e7+ST=0b1c1115494a5c0c14061615180a130112020714120f145c5107110011530255570b5e0b52161c1c1217060c175f1703011717030c091c0e19041d15170a055b0c0b0a070bNot Before08-06-2023 16:13Not After07-06-2024 16:13SubjectCN=525d0b323423120e110456060e332e32311412140236333d57310b361108382b0633,POSTALCODE=10802,ST=0b1c1115005f5c4ea5ddb5d9b9e5b4f74ba2e1a4e7+ST=0b1c1115494a5c0c14061615180a130112020714120f145c5107110011530255570b5e0b52161c1c1217060c175f1703011717030c091c0e19041d15170a055b0c0b0a070ba8:44:b4:f7:c8:f2:b4:cc:1e:eb:57:5b:ee:c3:85:90:ef:83:01:a8:ae:06:ce:0d:b0:77:1b:28:98:81:41:5bSigner
Actual PE Digesta8:44:b4:f7:c8:f2:b4:cc:1e:eb:57:5b:ee:c3:85:90:ef:83:01:a8:ae:06:ce:0d:b0:77:1b:28:98:81:41:5bDigest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetConsoleAliasExesLengthA
InterlockedIncrement
SetMailslotInfo
GetLogicalDriveStringsW
WritePrivateProfileSectionA
CreateDirectoryW
FreeEnvironmentStringsA
GetModuleHandleW
GetTickCount
EnumCalendarInfoExW
WaitNamedPipeW
EnumTimeFormatsW
SetProcessPriorityBoost
GetSystemDirectoryW
GetPrivateProfileStructW
GetCalendarInfoA
GetProcessHandleCount
LeaveCriticalSection
GetFileAttributesA
GetFileAttributesW
SetSystemPowerState
GetModuleFileNameW
CompareStringW
GetVolumePathNameA
GetShortPathNameA
EnumSystemLocalesA
GetPrivateProfileIntW
ConvertThreadToFiber
MoveFileW
SetComputerNameA
SearchPathA
OpenWaitableTimerA
LoadLibraryA
WriteConsoleA
InterlockedExchangeAdd
LocalAlloc
DeleteTimerQueue
MoveFileA
BuildCommDCBAndTimeoutsW
FindFirstVolumeMountPointW
IsSystemResumeAutomatic
AddAtomW
GetDiskFreeSpaceA
OpenJobObjectW
FindFirstVolumeMountPointA
EnumDateFormatsA
GetModuleHandleA
FindNextFileW
GetStringTypeW
GetConsoleTitleW
SetCalendarInfoA
SetThreadAffinityMask
SetFileShortNameA
FindAtomW
GetVolumeNameForVolumeMountPointW
DeleteFileW
AreFileApisANSI
GetDriveTypeW
GetProcAddress
CreateMutexW
CloseHandle
WriteConsoleW
GetLastError
HeapFree
DeleteFileA
WideCharToMultiByte
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RaiseException
HeapAlloc
IsProcessorFeaturePresent
EncodePointer
DecodePointer
HeapCreate
EnterCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
GetCPInfo
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
ExitProcess
WriteFile
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
RtlUnwind
LCMapStringW
MultiByteToWideChar
SetFilePointer
GetConsoleCP
GetConsoleMode
HeapSize
LoadLibraryW
HeapReAlloc
FlushFileBuffers
SetStdHandle
CreateFileW
gdi32
GetCharABCWidthsW
SelectObject
shell32
DuplicateIcon
Sections
.text Size: 75KB - Virtual size: 75KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4.0MB - Virtual size: 44.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 122KB - Virtual size: 121KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ