Static task
static1
General
-
Target
9641e8ab6818bde0d7fa28079436e8c210e6824f580d158480a3d220b3a0872a
-
Size
4.1MB
-
MD5
e930ba400d5143764852800fbac6881c
-
SHA1
0f1f6883147e27ca986519bf4d5488faf669337e
-
SHA256
9641e8ab6818bde0d7fa28079436e8c210e6824f580d158480a3d220b3a0872a
-
SHA512
345d19dccaa31e2f6978ad9d42c79401d7b315b684f78b76ff6b844d43a0067a6d9e07d9ae99a3e89e0c29f7e93d0b3f620368e5e07eb41bcecbce3f5028ea1c
-
SSDEEP
98304:of4gWXUyj0VMcjrgIRVcdV3jrKxv0W7RpVRSYiKURM6eLBTfkA:g8mVPrgID6xjr+0W7RLRSYiPReBfH
Malware Config
Signatures
Files
-
9641e8ab6818bde0d7fa28079436e8c210e6824f580d158480a3d220b3a0872a.exe windows x86
7d6df4fc54c54990fefdaf7d1c8b703b
Code Sign
6c:7f:bb:a4:83:b1:ca:ec:41:a2:e5:18:d1:43:a4:e4Certificate
IssuerCN=5251371f362b4011042b13043a2d223e0f19152c2014093e313d075d110f3d082e50,POSTALCODE=10802,ST=0b1c1115005f5c4e16070b17070e0c1c025d120116010a07+ST=0b1c1115494a5c52100110515d52141b57170d14161d12025206141340084056005707170746501e16121203571c1452160c10121450010500175112041a055b0c0b0a070bNot Before15-08-2023 12:36Not After14-08-2024 12:36SubjectCN=5251371f362b4011042b13043a2d223e0f19152c2014093e313d075d110f3d082e50,POSTALCODE=10802,ST=0b1c1115005f5c4e16070b17070e0c1c025d120116010a07+ST=0b1c1115494a5c52100110515d52141b57170d14161d12025206141340084056005707170746501e16121203571c1452160c10121450010500175112041a055b0c0b0a070b92:6e:2c:4d:b4:7e:e3:6f:7d:bc:35:40:1d:3b:6f:16:c8:31:a6:3e:bf:0b:aa:6c:18:b1:0c:a3:2b:0a:6b:07Signer
Actual PE Digest92:6e:2c:4d:b4:7e:e3:6f:7d:bc:35:40:1d:3b:6f:16:c8:31:a6:3e:bf:0b:aa:6c:18:b1:0c:a3:2b:0a:6b:07Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetComputerNameA
SearchPathW
InterlockedDecrement
WriteConsoleInputA
GetModuleHandleW
GetTickCount
GetCommConfig
GetConsoleAliasesLengthA
FormatMessageW
TransactNamedPipe
GetNamedPipeInfo
GetModuleFileNameW
CreateActCtxA
GetACP
DisconnectNamedPipe
GetConsoleAliasesW
GetProfileIntA
GetLastError
GetProcAddress
VirtualAlloc
LoadLibraryA
SetFileApisToANSI
FindNextChangeNotification
FoldStringW
WriteProfileStringA
HeapSetInformation
UpdateResourceW
CancelTimerQueueTimer
FindNextFileW
GetCurrentThreadId
Module32NextW
ReadConsoleInputW
TlsAlloc
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
Sleep
ExitProcess
GetStartupInfoW
RaiseException
RtlUnwind
HeapAlloc
HeapFree
WriteFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
FlushFileBuffers
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
SetFilePointer
GetStdHandle
GetModuleFileNameA
InitializeCriticalSectionAndSpinCount
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
HeapCreate
VirtualFree
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapReAlloc
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
MultiByteToWideChar
SetStdHandle
GetCPInfo
GetOEMCP
IsValidCodePage
GetModuleHandleA
HeapSize
GetLocaleInfoA
CreateFileA
CloseHandle
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
user32
CharUpperBuffW
LoadMenuA
CharLowerBuffW
CreateAcceleratorTableA
CharToOemBuffA
Sections
.text Size: 4.0MB - Virtual size: 4.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 20.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 38KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ