Static task
static1
General
-
Target
5e0b763928b7fe6415966c724f0ba2492d4a2fc599fcb82c3e8bb0fdc7fdf272
-
Size
4.2MB
-
MD5
c2c0045df70c2f3f0d42e4753d19417a
-
SHA1
71b38e84e9d981ec22d34fbca93f042bfce60053
-
SHA256
5e0b763928b7fe6415966c724f0ba2492d4a2fc599fcb82c3e8bb0fdc7fdf272
-
SHA512
61562d05d8c525583d64a53d03aeb490b10b6a1279eded61dedea3d5e8981f285419bec498b24f55fb43a9ab410e7cc72dff2705a1e735b0942ed6409dd79c4b
-
SSDEEP
98304:Gz5FeZNqPIzg4FFxwphIzdjk774xo8D8nX4gNkuyR6vf:ieftU4FwphwkH4VIX4WkHR6vf
Malware Config
Signatures
Files
-
5e0b763928b7fe6415966c724f0ba2492d4a2fc599fcb82c3e8bb0fdc7fdf272.exe windows x86
53827632ddd0de733b0a70caaced2fc3
Code Sign
d3:1c:d2:a1:e9:7d:f5:8a:73:2e:bc:96:92:8d:1a:55Certificate
IssuerCN=522036264b3c07530c0910253d36220330152b1b14292e1a512d092b0b3746071333,POSTALCODE=10700,ST=0b1c1115005f5c4e0f020a1000040b144b1e0e06000a14+ST=0b1c1115494a5c031c0b02081a1750475310151f070b57051217441d47031d1512195d501615110b570d0a17550b1209150a45131d1315075a001044160a055b0c0b0a070bNot Before02/08/2023, 19:15Not After01/08/2024, 19:15SubjectCN=522036264b3c07530c0910253d36220330152b1b14292e1a512d092b0b3746071333,POSTALCODE=10700,ST=0b1c1115005f5c4e0f020a1000040b144b1e0e06000a14+ST=0b1c1115494a5c031c0b02081a1750475310151f070b57051217441d47031d1512195d501615110b570d0a17550b1209150a45131d1315075a001044160a055b0c0b0a070ba9:91:94:f4:54:f6:14:32:33:00:fe:cd:d0:d7:47:25:c8:62:a2:ca:29:e7:29:7a:da:f5:ae:29:5f:76:b1:ffSigner
Actual PE Digesta9:91:94:f4:54:f6:14:32:33:00:fe:cd:d0:d7:47:25:c8:62:a2:ca:29:e7:29:7a:da:f5:ae:29:5f:76:b1:ffDigest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommandLineW
SetInformationJobObject
GetConsoleAliasesLengthW
GetConsoleAliasExesA
ConvertThreadToFiber
GetConsoleAliasExesLengthA
DeleteVolumeMountPointA
MoveFileExW
InterlockedDecrement
WaitNamedPipeA
GetCurrentProcess
GetSystemWindowsDirectoryW
GetNamedPipeHandleStateA
SetHandleInformation
GetProfileStringW
GetComputerNameW
GetTimeFormatA
FlushConsoleInputBuffer
GetSystemDefaultLCID
FreeEnvironmentStringsA
_lclose
_lcreat
GetModuleHandleW
GetNumberFormatA
ReadConsoleOutputA
EnumTimeFormatsW
GetUserDefaultLangID
GetCommandLineA
GetDriveTypeA
GlobalAlloc
GetPrivateProfileIntA
GetSystemDirectoryW
SetFileShortNameW
LoadLibraryW
TerminateThread
ReadConsoleInputA
_hread
GetCalendarInfoW
GetConsoleAliasW
IsDBCSLeadByte
GetStartupInfoW
CreateMailslotW
SetCurrentDirectoryA
GetLastError
GetCurrentDirectoryW
SetLastError
GetProcAddress
HeapSize
BackupWrite
MoveFileW
SetComputerNameA
OpenMutexA
InterlockedExchangeAdd
OpenWaitableTimerW
GetFileType
MoveFileA
BuildCommDCBAndTimeoutsW
SetConsoleCtrlHandler
GlobalGetAtomNameW
GetPrivateProfileStructA
FindNextFileA
CreateIoCompletionPort
GetModuleHandleA
OpenFileMappingW
GetProcessAffinityMask
FindNextFileW
VirtualProtect
EnumDateFormatsW
GetConsoleCursorInfo
FatalAppExitA
PeekConsoleInputA
OpenSemaphoreW
FindFirstVolumeA
LocalSize
GetWindowsDirectoryW
GetVolumeNameForVolumeMountPointW
DeleteFileW
ReadConsoleOutputCharacterW
EnumSystemLocalesW
CloseHandle
ReadFile
WriteConsoleW
InterlockedIncrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
EncodePointer
DecodePointer
HeapFree
HeapAlloc
DeleteFileA
ExitProcess
HeapSetInformation
RtlUnwind
HeapCreate
WriteFile
GetStdHandle
GetModuleFileNameW
SetFilePointer
SetHandleCount
InitializeCriticalSectionAndSpinCount
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
RaiseException
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetStringTypeW
MultiByteToWideChar
IsProcessorFeaturePresent
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
HeapReAlloc
LCMapStringW
CreateFileW
user32
CharUpperBuffA
CharUpperA
Sections
.text Size: 155KB - Virtual size: 155KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4.0MB - Virtual size: 34.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 88KB - Virtual size: 87KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ