Static task
static1
General
-
Target
da0e3671b11e28e0cc313c8cda55dc879fb486bc254925cbe5b1d0aed1348d99
-
Size
4.1MB
-
MD5
bf8e1dbe7020ec574b999b7d8e034e63
-
SHA1
5c2e04db89e8a9a174b37b4c95cf13d03cd666ad
-
SHA256
da0e3671b11e28e0cc313c8cda55dc879fb486bc254925cbe5b1d0aed1348d99
-
SHA512
8cec5af255b22cfcec1048ace95cb6813da1ee0f0ddbaa3d17f4222e4eb47eefa3487a09cf0e7b73919965af5d83311519f9e7fc8b3967cf458d79192120fde1
-
SSDEEP
49152:8Yf2Oj5+1+ExtXWbKc1vlpdkGqgYWJSdQadUwDhqNfYmdMQQ+u/P4Ktt1cPHnPDS:8UlP3j0SxBadZhqNrMQQlYvGl8w9DB
Malware Config
Signatures
Files
-
da0e3671b11e28e0cc313c8cda55dc879fb486bc254925cbe5b1d0aed1348d99.exe windows:5 windows x86
c143dae01d73240a7a66b5641dc3f084
Code Sign
01:d5:12:a1:0f:77:55:a9:7e:db:26:29:78:ae:af:64Certificate
IssuerCN=52263d520931235736570a2402571c4021122b211102515e242235323619033a0b11,POSTALCODE=10805,ST=0b1c1115005f5c4e07060b1709090d1c1000040f194b0d0d11+ST=0b1c1115494a5c5305080e17100e0340021d1116090d510a0d0c455712130f510c06110f020b0a100346090b065b0e06410b06530c151c1b191457400b12055b0c0b0a070bNot Before12/10/2023, 12:49Not After11/10/2024, 12:49SubjectCN=52263d520931235736570a2402571c4021122b211102515e242235323619033a0b11,POSTALCODE=10805,ST=0b1c1115005f5c4e07060b1709090d1c1000040f194b0d0d11+ST=0b1c1115494a5c5305080e17100e0340021d1116090d510a0d0c455712130f510c06110f020b0a100346090b065b0e06410b06530c151c1b191457400b12055b0c0b0a070b49:59:3e:cf:65:1b:c4:64:5d:77:a6:6c:8c:62:f2:8a:22:af:95:a5:e0:4a:e2:88:00:61:37:a7:c9:a0:13:c6Signer
Actual PE Digest49:59:3e:cf:65:1b:c4:64:5d:77:a6:6c:8c:62:f2:8a:22:af:95:a5:e0:4a:e2:88:00:61:37:a7:c9:a0:13:c6Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTempFileNameW
SetVolumeLabelA
SetDefaultCommConfigA
GetConsoleAliasesLengthW
GetModuleHandleExA
GetLocaleInfoA
GetConsoleAliasExesA
CommConfigDialogA
FindResourceExW
FindResourceW
MapUserPhysicalPages
OpenJobObjectA
ReadConsoleA
InterlockedDecrement
QueryPerformanceCounter
GetEnvironmentStringsW
WriteConsoleInputA
SetComputerNameW
FreeEnvironmentStringsA
SetTapeParameters
SetThreadUILanguage
ConvertFiberToThread
GetConsoleTitleA
GetWindowsDirectoryA
GetCompressedFileSizeW
WaitNamedPipeW
EnumTimeFormatsA
WriteFile
GetCommandLineA
GetDriveTypeA
GetEnvironmentStrings
GetConsoleCP
LoadLibraryW
GetConsoleMode
ReadConsoleInputA
DeleteVolumeMountPointW
EnumSystemCodePagesA
GetFileAttributesW
GetComputerNameA
GetAtomNameW
CreateFileW
GetVolumePathNameA
FindNextVolumeMountPointW
GetStartupInfoW
GetNamedPipeHandleStateW
GetConsoleAliasesW
FindFirstFileA
GetLastError
SetLastError
HeapUnlock
CopyFileA
FindClose
LoadLibraryA
LocalAlloc
MoveFileA
BuildCommDCBAndTimeoutsW
CreateHardLinkW
RemoveDirectoryW
GetCommMask
AddAtomA
FoldStringW
GetPrivateProfileSectionNamesA
GetOEMCP
FindNextFileA
GetModuleHandleA
GetStringTypeW
VirtualProtect
QueryPerformanceFrequency
FatalAppExitA
PeekConsoleInputA
GetShortPathNameW
SetCalendarInfoA
OpenSemaphoreW
FindFirstVolumeW
ReadConsoleOutputCharacterW
DeleteFileA
IsProcessorFeaturePresent
WriteConsoleW
FlushFileBuffers
SetSystemPowerState
GetVolumeNameForVolumeMountPointA
SetStdHandle
HeapFree
HeapAlloc
GetProcAddress
GetModuleHandleW
ExitProcess
DecodePointer
WideCharToMultiByte
HeapReAlloc
GetCommandLineW
HeapSetInformation
HeapCreate
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
TerminateProcess
GetCurrentProcess
GetModuleFileNameW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
GetCPInfo
GetACP
IsValidCodePage
CloseHandle
FreeEnvironmentStringsW
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
SetFilePointer
RtlUnwind
HeapSize
LCMapStringW
MultiByteToWideChar
RaiseException
user32
CharUpperBuffA
CharUpperW
gdi32
GetTextFaceA
winhttp
WinHttpReadData
Sections
.text Size: 4.1MB - Virtual size: 4.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 30.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vuguxo Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.zacupo Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ