Static task
static1
General
-
Target
0b869f4897f673d5d3df998fbe8a185cc7c9ee2b5d0228ed5ce5e46f125a7c22
-
Size
4.1MB
-
MD5
94516556bb1c18df471daa662b0d21e5
-
SHA1
3a5143b5d85d06bd9e8428798cce2fdef6fb5e8d
-
SHA256
0b869f4897f673d5d3df998fbe8a185cc7c9ee2b5d0228ed5ce5e46f125a7c22
-
SHA512
bcd299020a1621dd3c7482afe1e377b03c6995fae4202c452c302d1c2ac07b0686339fac66ea6fd1fcda3f877b024008df6fba043f31d68fa18922aa31080081
-
SSDEEP
98304:z5gvbkQzx+togQWJvOnwZoVSyEekafUQXA4R:z5gDk5HvfZfyEEjXZ
Malware Config
Signatures
Files
-
0b869f4897f673d5d3df998fbe8a185cc7c9ee2b5d0228ed5ce5e46f125a7c22.exe windows x86
b3c0aa56121c87bf3d30d2624a2be74c
Code Sign
2e:46:20:19:aa:60:84:62:5a:a7:66:54:a5:47:86:ceCertificate
IssuerCN=5251371f362b4011042b13043a2d223e0f19152c2014093e313d075d110f3d082e50,POSTALCODE=10802,ST=0b1c1115005f5c4e16070b17070e0c1c025d120116010a07+ST=0b1c1115494a5c52100110515d52141b57170d14161d12025206141340084056005707170746501e16121203571c1452160c10121450010500175112041a055b0c0b0a070bNot Before13/06/2023, 04:31Not After12/06/2024, 04:31SubjectCN=5251371f362b4011042b13043a2d223e0f19152c2014093e313d075d110f3d082e50,POSTALCODE=10802,ST=0b1c1115005f5c4e16070b17070e0c1c025d120116010a07+ST=0b1c1115494a5c52100110515d52141b57170d14161d12025206141340084056005707170746501e16121203571c1452160c10121450010500175112041a055b0c0b0a070b16:58:68:46:16:14:c2:8a:27:96:19:79:72:c1:a4:1c:8a:f8:0f:20:c1:8d:1c:29:d8:19:3e:27:cc:08:cf:6aSigner
Actual PE Digest16:58:68:46:16:14:c2:8a:27:96:19:79:72:c1:a4:1c:8a:f8:0f:20:c1:8d:1c:29:d8:19:3e:27:cc:08:cf:6aDigest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLogicalDriveStringsW
WaitForSingleObject
AddConsoleAliasW
CreateHardLinkA
GetProcessPriorityBoost
GetModuleHandleW
GetTickCount
VirtualFree
GetConsoleAliasesA
ReadConsoleW
GetConsoleAliasExesW
FindResourceExA
GlobalAlloc
_hread
FormatMessageW
GetVersionExW
ReadFile
CreateActCtxA
GetACP
GlobalUnlock
InterlockedExchange
GetLastError
_lwrite
GetProcAddress
VirtualAlloc
IsValidCodePage
CreateMemoryResourceNotification
LoadLibraryA
WriteConsoleA
SetCurrentDirectoryW
FindAtomA
GetModuleFileNameA
OpenFileMappingW
VirtualProtect
GetCurrentDirectoryA
GetCurrentThreadId
FileTimeToLocalFileTime
GetCurrentProcessId
FindNextVolumeA
CommConfigDialogW
WriteConsoleW
GetConsoleOutputCP
GetLocaleInfoA
WriteConsoleOutputW
CreateTimerQueue
ReadConsoleOutputCharacterA
LocalUnlock
GetProcessHeap
SetEndOfFile
InterlockedIncrement
InterlockedDecrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
ExitProcess
GetCommandLineA
GetStartupInfoA
RtlUnwind
RaiseException
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
GetCPInfo
HeapAlloc
HeapCreate
HeapReAlloc
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
HeapSize
SetHandleCount
GetStdHandle
GetFileType
WriteFile
InitializeCriticalSectionAndSpinCount
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetOEMCP
GetStringTypeA
GetStringTypeW
CloseHandle
CreateFileA
SetFilePointer
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetStdHandle
user32
CharUpperBuffA
LoadMenuW
GetCaretPos
gdi32
GetCharacterPlacementW
advapi32
MapGenericMask
ReportEventW
ole32
ReadClassStg
Sections
.text Size: 4.0MB - Virtual size: 4.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 2.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52KB - Virtual size: 2.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ