Static task
static1
General
-
Target
38bbfe67a514b069a9f02ddd0176e5c6142b281e4a5ae2983144ecb0f3af1b80
-
Size
4.1MB
-
MD5
b56c7546754f035c71c519caf67cf4b8
-
SHA1
3981ef22fa1c63ab74088c3dae07d44670ac4f14
-
SHA256
38bbfe67a514b069a9f02ddd0176e5c6142b281e4a5ae2983144ecb0f3af1b80
-
SHA512
40682231cc53353269b0a611d9c5c77f8b4cddade620b52076990eb9f5961ef4b0fd0caad6db690f449d9ae8b48fc9c3d1075d9e600f1eba48a8a1a6cdf18c94
-
SSDEEP
98304:SbxypqKgAbiJP0qKxTbJ9Bb5zQW7PfBzApQRMKse22GBkJEPv:S9nsiJ8qQBBQCZzApEMi22GBKE3
Malware Config
Signatures
Files
-
38bbfe67a514b069a9f02ddd0176e5c6142b281e4a5ae2983144ecb0f3af1b80.exe windows x86
55f2fae2d830ccf9734788609a42549e
Code Sign
a8:7e:a0:8b:36:71:84:83:d5:f2:38:2b:7b:e0:62:70Certificate
IssuerCN=522036264b3c07530c0910253d36220330152b1b14292e1a512d092b0b3746071333,POSTALCODE=10812,ST=0b1c1115005f5c4e0f020a1000040b144b1e0e06000a14+ST=0b1c1115494a5c031c0b02081a1750475310151f070b57051217441d47031d1512195d501615110b570d0a17550b1209150a45131d1315075a001044160a055b0c0b0a070bNot Before20/09/2023, 05:00Not After19/09/2024, 05:00SubjectCN=522036264b3c07530c0910253d36220330152b1b14292e1a512d092b0b3746071333,POSTALCODE=10812,ST=0b1c1115005f5c4e0f020a1000040b144b1e0e06000a14+ST=0b1c1115494a5c031c0b02081a1750475310151f070b57051217441d47031d1512195d501615110b570d0a17550b1209150a45131d1315075a001044160a055b0c0b0a070b2b:c4:f4:c9:e9:61:af:45:a0:14:23:d4:0e:0e:bf:52:d3:b2:51:78:6b:3d:43:53:4b:e5:c3:88:d2:d4:f1:29Signer
Actual PE Digest2b:c4:f4:c9:e9:61:af:45:a0:14:23:d4:0e:0e:bf:52:d3:b2:51:78:6b:3d:43:53:4b:e5:c3:88:d2:d4:f1:29Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDateFormatW
CreateFileA
SetThreadContext
FindFirstChangeNotificationW
WriteConsoleInputW
SetFilePointer
PeekNamedPipe
SetConsoleTextAttribute
OpenJobObjectA
GetLogicalDriveStringsW
InterlockedCompareExchange
CreateHardLinkA
GetTickCount
FormatMessageA
GetGeoInfoW
LoadLibraryW
SizeofResource
GetFileAttributesW
FileTimeToSystemTime
IsDBCSLeadByte
GetModuleFileNameW
SetThreadPriority
GlobalUnlock
GetShortPathNameA
GetLastError
GetProcAddress
VirtualAlloc
BeginUpdateResourceW
BackupWrite
GetTempFileNameA
LoadLibraryA
CreateHardLinkW
FoldStringA
FindNextFileA
FreeEnvironmentStringsW
EnumResourceNamesA
OpenSemaphoreW
FindFirstVolumeA
GetConsoleProcessList
ReadConsoleOutputCharacterW
FindNextVolumeA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
ReadFile
InterlockedIncrement
InterlockedDecrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
GetStartupInfoA
RtlUnwind
RaiseException
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
GetCPInfo
HeapAlloc
HeapCreate
VirtualFree
HeapReAlloc
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
SetHandleCount
GetStdHandle
GetFileType
ExitProcess
WriteFile
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
GetEnvironmentStringsW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapSize
GetACP
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
GetStringTypeW
InitializeCriticalSectionAndSpinCount
CloseHandle
GetConsoleCP
GetConsoleMode
GetLocaleInfoW
GetModuleHandleA
FlushFileBuffers
SetStdHandle
SetEndOfFile
GetProcessHeap
user32
GetMessageExtraInfo
LoadMenuA
GetClassInfoExW
DdeQueryStringA
CharToOemBuffA
Sections
.text Size: 4.1MB - Virtual size: 4.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 711KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 27KB - Virtual size: 4.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ