Static task
static1
General
-
Target
72caba7704b9733ef34abb52a413509510e6026bfad0b6a4a73ab961ad103d2e
-
Size
4.1MB
-
MD5
cc193ac8cf296162fe91b96985e30413
-
SHA1
98cd229f190fb993df06648b2c2675fa254cd3dc
-
SHA256
72caba7704b9733ef34abb52a413509510e6026bfad0b6a4a73ab961ad103d2e
-
SHA512
d96a9e0ebe530961cbd421b4267f159402efbd16d4e00947f8daf0f92227688a747f377517863e1a8a2244c372ea187c68107744f561c70ad774fed2de48c62b
-
SSDEEP
98304:0FGNd97mmmvdUlyNYFv+hipudY9n44dSeAVKnYbIk:Xd9iRUNFGhWDnNkAY
Malware Config
Signatures
Files
-
72caba7704b9733ef34abb52a413509510e6026bfad0b6a4a73ab961ad103d2e.exe windows x86
83f305571af3bad4fd0b459ab4b0a012
Code Sign
02:22:0d:e8:98:ea:15:fe:7b:a4:84:27:08:41:72:41Certificate
IssuerCN=525d0b323423120e110456060e332e32311412140236333d57310b361108382b0633,POSTALCODE=10700,ST=0b1c1115005f5c4ea5ddb5d9b9e5b4f74ba2e1a4e7+ST=0b1c1115494a5c0c14061615180a130112020714120f145c5107110011530255570b5e0b52161c1c1217060c175f1703011717030c091c0e19041d15170a055b0c0b0a070bNot Before21/08/2023, 23:11Not After20/08/2024, 23:11SubjectCN=525d0b323423120e110456060e332e32311412140236333d57310b361108382b0633,POSTALCODE=10700,ST=0b1c1115005f5c4ea5ddb5d9b9e5b4f74ba2e1a4e7+ST=0b1c1115494a5c0c14061615180a130112020714120f145c5107110011530255570b5e0b52161c1c1217060c175f1703011717030c091c0e19041d15170a055b0c0b0a070b52:2b:b9:9c:3a:17:7d:0b:6d:8b:06:b2:f5:4b:49:b2:6e:34:7d:9e:44:23:62:c1:ca:bf:0f:1a:74:b9:f0:c9Signer
Actual PE Digest52:2b:b9:9c:3a:17:7d:0b:6d:8b:06:b2:f5:4b:49:b2:6e:34:7d:9e:44:23:62:c1:ca:bf:0f:1a:74:b9:f0:c9Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetFilePointer
DebugActiveProcessStop
LoadResource
ClearCommError
InterlockedIncrement
InterlockedDecrement
GetCurrentProcess
SetEnvironmentVariableW
FreeEnvironmentStringsA
GetModuleHandleW
GetConsoleAliasesA
ReadConsoleW
GetDateFormatA
LoadLibraryW
GetSystemWindowsDirectoryA
GetConsoleAliasExesLengthW
CreateFileW
InterlockedExchange
FindFirstFileA
GetLastError
GetProcAddress
VirtualAlloc
LocalLock
CopyFileA
GetConsoleDisplayMode
VirtualAllocEx
LoadModule
CreateHardLinkW
SetConsoleCtrlHandler
GetOEMCP
GlobalUnWire
ContinueDebugEvent
FatalExit
FindNextFileW
SetProcessShutdownParameters
DeleteAtom
GetTempPathA
AreFileApisANSI
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
Sleep
ExitProcess
GetStartupInfoW
RaiseException
RtlUnwind
HeapAlloc
HeapFree
WriteFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
FlushFileBuffers
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
GetStdHandle
GetModuleFileNameA
LoadLibraryA
InitializeCriticalSectionAndSpinCount
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapReAlloc
GetModuleHandleA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
MultiByteToWideChar
SetStdHandle
GetCPInfo
GetACP
IsValidCodePage
HeapSize
GetLocaleInfoA
CreateFileA
CloseHandle
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
user32
FlashWindowEx
CharUpperBuffA
LoadMenuW
CharLowerBuffA
OemToCharW
Sections
.text Size: 4.0MB - Virtual size: 4.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 20.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ