Static task
static1
General
-
Target
7681524cf5a14bac2640cea19e875247298ce7bdbd7cc34f2a9d5b3a3339bf49
-
Size
4.1MB
-
MD5
7f2f0d2eb13c41ff8f3a895171ebd2d1
-
SHA1
8035490fdc48a2a65ea79e2a14acbe1a3f763549
-
SHA256
7681524cf5a14bac2640cea19e875247298ce7bdbd7cc34f2a9d5b3a3339bf49
-
SHA512
863001175a6e133e2440bace104a1661640b28847d2170b8bbc10757ad705be9adc7bccd51149f50aec499bb7473965af3df2c2fc07acda8a4eacb1cb22faead
-
SSDEEP
98304:cySmrXo9mLeb7N0e8ZglBXxsSxIdQHSHJa6DfKuPZ:XXDViwGl0SxeQHgD
Malware Config
Signatures
Files
-
7681524cf5a14bac2640cea19e875247298ce7bdbd7cc34f2a9d5b3a3339bf49.exe windows x86
81a47929bdbad1a6e843c1dc8ab5e1d0
Code Sign
fe:70:75:36:00:81:f9:b6:cb:d4:9a:f5:bf:90:72:c2Certificate
IssuerCN=525c3d3f1b06302b310410391d3f23471542520105293b2253150610173842041410,POSTALCODE=10700,ST=0b1c1115005f5c4e0f020a1000040b140d120e0f4d0b061c+ST=0b1c1115494a5c024150110d05170e09031e0a1f1a0150025113451d111807075354195315000e091843540114031f0f4053060e0414150c0210571f0a0a055b0c0b0a070bNot Before16/08/2023, 12:24Not After15/08/2024, 12:24SubjectCN=525c3d3f1b06302b310410391d3f23471542520105293b2253150610173842041410,POSTALCODE=10700,ST=0b1c1115005f5c4e0f020a1000040b140d120e0f4d0b061c+ST=0b1c1115494a5c024150110d05170e09031e0a1f1a0150025113451d111807075354195315000e091843540114031f0f4053060e0414150c0210571f0a0a055b0c0b0a070bd5:fa:2c:7c:f2:d1:9b:fa:37:08:f4:f0:a8:9e:c1:cb:6b:e1:04:74:b7:e1:a6:80:65:d0:e9:c7:f5:7a:ce:04Signer
Actual PE Digestd5:fa:2c:7c:f2:d1:9b:fa:37:08:f4:f0:a8:9e:c1:cb:6b:e1:04:74:b7:e1:a6:80:65:d0:e9:c7:f5:7a:ce:04Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DebugActiveProcessStop
LoadResource
UpdateResourceA
InterlockedIncrement
InterlockedDecrement
WriteConsoleInputA
GetModuleHandleW
GetConsoleAliasesA
GetConsoleAliasesLengthA
SetCommConfig
ReadConsoleInputA
FormatMessageW
CreateActCtxA
GetLastError
SetLastError
GetProcAddress
VirtualAlloc
LoadLibraryA
SetConsoleCtrlHandler
SetFilePointer
GetProfileStringA
FindNextChangeNotification
HeapWalk
FoldStringW
GetModuleFileNameA
CancelTimerQueueTimer
FindNextFileW
WriteProfileStringW
GetCurrentThreadId
Module32NextW
TlsAlloc
AreFileApisANSI
CloseHandle
CreateFileA
SetConsoleDisplayMode
GetComputerNameA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
Sleep
ExitProcess
GetStartupInfoW
RaiseException
RtlUnwind
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsSetValue
TlsFree
HeapAlloc
HeapFree
WriteFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
FlushFileBuffers
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
HeapReAlloc
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
GetModuleHandleA
HeapSize
user32
CharUpperBuffW
LoadMenuA
CreateAcceleratorTableW
CharToOemBuffA
gdi32
GetCharABCWidthsI
Sections
.text Size: 4.1MB - Virtual size: 4.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 20.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ