Static task
static1
General
-
Target
8eeace104266065bb1532b37e2ff83684be2914830102e39b3739cf9b3b93933
-
Size
4.1MB
-
MD5
99d6602b0d60179a117b03a9dd0c799a
-
SHA1
e81661586c153fd757a5df45f787098149fdc26c
-
SHA256
8eeace104266065bb1532b37e2ff83684be2914830102e39b3739cf9b3b93933
-
SHA512
e4862a10a14492bac4147a91ddcfbfa9a2b519da0071bbc50e6701e31d2450643f4973d32282734e577cac3708e41f715cbf9dbb09ef7a691f016f79796da94f
-
SSDEEP
98304:BKTKJ4SWuG0HanpKb3dfZVR42SNqcdQy15pPj/3cBw/Zfd1i:M+vWuz4wTdRn42SHdQUvPj/MBAJdo
Malware Config
Signatures
Files
-
8eeace104266065bb1532b37e2ff83684be2914830102e39b3739cf9b3b93933.exe windows x86
62cf5d374830daec9bf2af2d06909e14
Code Sign
77:50:a5:46:e2:ae:51:27:a6:cb:85:ec:6d:41:b7:64Certificate
IssuerCN=522b1f00070a2734475a3201002b1c42301c1b0732151b1d231030330b0713013107,POSTALCODE=10805,ST=0b1c1115005f5c4e1802161701040e1609164f0d1a1f+ST=0b1c1115494a5c141b55031011521200011110175651021a0c0100080654181701000b110407101e081204565401155144530712111a57090e5304000602055b0c0b0a070bNot Before15/08/2023, 21:42Not After14/08/2024, 21:42SubjectCN=522b1f00070a2734475a3201002b1c42301c1b0732151b1d231030330b0713013107,POSTALCODE=10805,ST=0b1c1115005f5c4e1802161701040e1609164f0d1a1f+ST=0b1c1115494a5c141b55031011521200011110175651021a0c0100080654181701000b110407101e081204565401155144530712111a57090e5304000602055b0c0b0a070b5d:3b:4e:3c:cf:39:d5:e2:b0:dc:cc:f1:12:27:d7:33:69:31:1c:2b:80:51:73:0a:02:a9:cd:61:24:c6:14:e0Signer
Actual PE Digest5d:3b:4e:3c:cf:39:d5:e2:b0:dc:cc:f1:12:27:d7:33:69:31:1c:2b:80:51:73:0a:02:a9:cd:61:24:c6:14:e0Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedIncrement
InterlockedDecrement
WriteConsoleInputA
GetComputerNameW
GetModuleHandleW
GetCommConfig
GetConsoleAliasesLengthA
ReadConsoleInputA
FormatMessageW
TransactNamedPipe
GetNamedPipeInfo
GetModuleFileNameW
CreateActCtxA
GetACP
DisconnectNamedPipe
GetConsoleAliasesW
GetProfileIntA
GetLastError
SetLastError
GetProcAddress
LoadLibraryA
SetFileApisToANSI
FindNextChangeNotification
FoldStringW
WriteProfileStringA
HeapSetInformation
UpdateResourceW
CancelTimerQueueTimer
FindNextFileW
GetCurrentThreadId
Module32NextW
TlsAlloc
VirtualAlloc
SearchPathW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
Sleep
ExitProcess
GetStartupInfoW
RaiseException
RtlUnwind
HeapAlloc
HeapFree
WriteFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
FlushFileBuffers
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
TlsGetValue
TlsSetValue
TlsFree
SetFilePointer
GetStdHandle
GetModuleFileNameA
InitializeCriticalSectionAndSpinCount
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapReAlloc
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
MultiByteToWideChar
SetStdHandle
GetCPInfo
GetOEMCP
IsValidCodePage
GetModuleHandleA
HeapSize
GetLocaleInfoA
CreateFileA
CloseHandle
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
user32
CharUpperBuffW
LoadMenuA
CreateAcceleratorTableA
CharToOemBuffA
gdi32
GetCharABCWidthsI
Sections
.text Size: 4.1MB - Virtual size: 4.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 20.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ