Static task
static1
General
-
Target
4adb3b69aa6e6e26c4e1541e64db9a73ee9d53a81af792bfe115fb1ed1964203
-
Size
4.1MB
-
MD5
67b1c1c883366446b883bc6bc4a916bf
-
SHA1
38e8b5eaeea1c669e89059947a106b25215b6acf
-
SHA256
4adb3b69aa6e6e26c4e1541e64db9a73ee9d53a81af792bfe115fb1ed1964203
-
SHA512
01170d559fb485f748b6815b00ff75119f238d78f85f11216f3fc4a3439fcfa350a0b19101dc96df4ff575236268594ca168a87ca10cc114cf150b9ab8b20b7a
-
SSDEEP
98304:1IsSi90JslYD6GrXPt2h0QvqnTrYq3j0ffA3pUcZE0qQ7xgc:asSi90alY2CXPG7vqnHTwf4wSv
Malware Config
Signatures
Files
-
4adb3b69aa6e6e26c4e1541e64db9a73ee9d53a81af792bfe115fb1ed1964203.exe windows x86
369416073ed39eb88716e6b4aeee9423
Code Sign
71:0e:08:3d:d1:53:11:22:24:9f:d5:ac:8a:20:18:1fCertificate
IssuerCN=522b0300053323224d0036132e0352222e2216260b17250f343c151c22001a3b0d00,POSTALCODE=10802,ST=0b1c1115005f5c4e16070b061d170a03165d121d0c15+ST=0b1c1115494a5c0a405601000f17134502120d431112025a0d5102560055050452040c11020709125303081f0a5b1f1d400c1808040a15195a101d060a1a055b0c0b0a070bNot Before21/08/2023, 23:31Not After20/08/2024, 23:31SubjectCN=522b0300053323224d0036132e0352222e2216260b17250f343c151c22001a3b0d00,POSTALCODE=10802,ST=0b1c1115005f5c4e16070b061d170a03165d121d0c15+ST=0b1c1115494a5c0a405601000f17134502120d431112025a0d5102560055050452040c11020709125303081f0a5b1f1d400c1808040a15195a101d060a1a055b0c0b0a070b31:f9:49:7c:67:2f:6d:19:df:3b:72:7d:2b:7e:66:30:19:3a:a2:c7:a2:8c:7d:bc:4a:32:02:7b:4d:5e:c6:65Signer
Actual PE Digest31:f9:49:7c:67:2f:6d:19:df:3b:72:7d:2b:7e:66:30:19:3a:a2:c7:a2:8c:7d:bc:4a:32:02:7b:4d:5e:c6:65Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DebugActiveProcessStop
LoadResource
ClearCommError
InterlockedDecrement
GetCurrentProcess
SetEnvironmentVariableW
CreateHardLinkA
FreeEnvironmentStringsA
GetModuleHandleW
GetConsoleAliasesA
ReadConsoleW
GetDateFormatA
LoadLibraryW
CopyFileW
GetSystemWindowsDirectoryA
GetConsoleAliasExesLengthW
CreateFileW
FindFirstFileA
GetLastError
GetProcAddress
VirtualAlloc
SetFilePointer
GetConsoleDisplayMode
VirtualAllocEx
LoadModule
SetConsoleCtrlHandler
GetOEMCP
GlobalUnWire
ContinueDebugEvent
FatalExit
FindNextFileW
SetProcessShutdownParameters
DeleteAtom
GetTempPathA
AreFileApisANSI
CloseHandle
CreateFileA
FlushFileBuffers
LocalLock
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
RaiseException
RtlUnwind
Sleep
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
TerminateProcess
IsDebuggerPresent
HeapAlloc
HeapFree
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LoadLibraryA
InitializeCriticalSectionAndSpinCount
HeapReAlloc
GetCPInfo
GetACP
IsValidCodePage
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
MultiByteToWideChar
SetStdHandle
HeapSize
GetLocaleInfoA
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
user32
FlashWindowEx
CharUpperBuffA
LoadMenuW
CharLowerBuffA
OemToCharW
advapi32
BackupEventLogA
Sections
.text Size: 4.0MB - Virtual size: 4.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 17KB - Virtual size: 31.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 35KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ