Static task
static1
General
-
Target
04353494bafda94d1f83fa5cb7b154e3d26e0647014abe4e9e9d91696d34296d
-
Size
4.2MB
-
MD5
083db78ffc5a13f65cef193af3dbf9ee
-
SHA1
24d5062886f5b928692a057e538d48ba03b12e24
-
SHA256
04353494bafda94d1f83fa5cb7b154e3d26e0647014abe4e9e9d91696d34296d
-
SHA512
f8276ceffe933673257209714d72d673cf0ae6dc313552fe8bca1df8f0fdbed10edbd5c07b528bfe90cb0e73195db10ba83623ee76dc1f940dc33f3e0dfa3cd0
-
SSDEEP
98304:Gz5FeZNqPIzg4FFxwphIzdjk774xo8D8nX4gNkuyR6vE:ieftU4FwphwkH4VIX4WkHR6vE
Malware Config
Signatures
Files
-
04353494bafda94d1f83fa5cb7b154e3d26e0647014abe4e9e9d91696d34296d.exe windows x86
53827632ddd0de733b0a70caaced2fc3
Code Sign
01:59:71:33:29:57:a2:5f:7c:ec:f3:dd:fa:ed:ca:58Certificate
IssuerCN=522910322628070b250c52200b542f1a57031b422732351e332f4620190820022d0b,POSTALCODE=10802,ST=0b1c1115005f5c4e16070b061d170a03165d091002091700+ST=0b1c1115494a5c18101602500b53081d121c021c1b120f07110e12511d161a5003091c030c1053460e4113160e181d130101060d401252070f0f08001312055b0c0b0a070bNot Before02/08/2023, 19:16Not After01/08/2024, 19:16SubjectCN=522910322628070b250c52200b542f1a57031b422732351e332f4620190820022d0b,POSTALCODE=10802,ST=0b1c1115005f5c4e16070b061d170a03165d091002091700+ST=0b1c1115494a5c18101602500b53081d121c021c1b120f07110e12511d161a5003091c030c1053460e4113160e181d130101060d401252070f0f08001312055b0c0b0a070ba9:91:94:f4:54:f6:14:32:33:00:fe:cd:d0:d7:47:25:c8:62:a2:ca:29:e7:29:7a:da:f5:ae:29:5f:76:b1:ffSigner
Actual PE Digesta9:91:94:f4:54:f6:14:32:33:00:fe:cd:d0:d7:47:25:c8:62:a2:ca:29:e7:29:7a:da:f5:ae:29:5f:76:b1:ffDigest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommandLineW
SetInformationJobObject
GetConsoleAliasesLengthW
GetConsoleAliasExesA
ConvertThreadToFiber
GetConsoleAliasExesLengthA
DeleteVolumeMountPointA
MoveFileExW
InterlockedDecrement
WaitNamedPipeA
GetCurrentProcess
GetSystemWindowsDirectoryW
GetNamedPipeHandleStateA
SetHandleInformation
GetProfileStringW
GetComputerNameW
GetTimeFormatA
FlushConsoleInputBuffer
GetSystemDefaultLCID
FreeEnvironmentStringsA
_lclose
_lcreat
GetModuleHandleW
GetNumberFormatA
ReadConsoleOutputA
EnumTimeFormatsW
GetUserDefaultLangID
GetCommandLineA
GetDriveTypeA
GlobalAlloc
GetPrivateProfileIntA
GetSystemDirectoryW
SetFileShortNameW
LoadLibraryW
TerminateThread
ReadConsoleInputA
_hread
GetCalendarInfoW
GetConsoleAliasW
IsDBCSLeadByte
GetStartupInfoW
CreateMailslotW
SetCurrentDirectoryA
GetLastError
GetCurrentDirectoryW
SetLastError
GetProcAddress
HeapSize
BackupWrite
MoveFileW
SetComputerNameA
OpenMutexA
InterlockedExchangeAdd
OpenWaitableTimerW
GetFileType
MoveFileA
BuildCommDCBAndTimeoutsW
SetConsoleCtrlHandler
GlobalGetAtomNameW
GetPrivateProfileStructA
FindNextFileA
CreateIoCompletionPort
GetModuleHandleA
OpenFileMappingW
GetProcessAffinityMask
FindNextFileW
VirtualProtect
EnumDateFormatsW
GetConsoleCursorInfo
FatalAppExitA
PeekConsoleInputA
OpenSemaphoreW
FindFirstVolumeA
LocalSize
GetWindowsDirectoryW
GetVolumeNameForVolumeMountPointW
DeleteFileW
ReadConsoleOutputCharacterW
EnumSystemLocalesW
CloseHandle
ReadFile
WriteConsoleW
InterlockedIncrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
EncodePointer
DecodePointer
HeapFree
HeapAlloc
DeleteFileA
ExitProcess
HeapSetInformation
RtlUnwind
HeapCreate
WriteFile
GetStdHandle
GetModuleFileNameW
SetFilePointer
SetHandleCount
InitializeCriticalSectionAndSpinCount
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
RaiseException
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetStringTypeW
MultiByteToWideChar
IsProcessorFeaturePresent
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
HeapReAlloc
LCMapStringW
CreateFileW
user32
CharUpperBuffA
CharUpperA
Sections
.text Size: 155KB - Virtual size: 155KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4.0MB - Virtual size: 34.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 88KB - Virtual size: 87KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ