Static task
static1
General
-
Target
abf0202260289b0ffe42ac889964ee8787cc27b465892c9021e45a081a280f35
-
Size
4.1MB
-
MD5
bde8f541fb91834c37819643a1b0e10b
-
SHA1
4ae930551a8c72d8855f2c46cc3511c2f0a0854d
-
SHA256
abf0202260289b0ffe42ac889964ee8787cc27b465892c9021e45a081a280f35
-
SHA512
94bde30b4f24b4ef5929c1db96ac1758bc343b9f8c1c926f299d4e22d743d8abc7ccedd0cf266eb1050c9135a20f30f22ccd0c478e2c0f7cc62d19ec57cb02f3
-
SSDEEP
98304:x79+KDGlFfaNIJJBLym9TSIjSJG04Iy6PyQls:jNDzNIJJACTwJG0C6PHs
Malware Config
Signatures
Files
-
abf0202260289b0ffe42ac889964ee8787cc27b465892c9021e45a081a280f35.exe windows:5 windows x86
301c8a1bd65529053ebf05ef09ce2f46
Code Sign
e7:8b:ec:22:8b:c0:39:95:80:59:38:3d:36:28:fb:2eCertificate
IssuerCN=522a29533d3f200e2d1728300c141021081631313626321023042b113f2d26353224,POSTALCODE=10823,ST=0b1c1115005f5c4e140f09101c0411000c1d4f0716+ST=0b1c1115494a5c17161151151d135100034653465007170e1c520b071c040f0f5216050f1244171f0b110e04061211081e0347124308570a1e0c0b19560a055b0c0b0a070bNot Before24/10/2023, 12:10Not After23/10/2024, 12:10SubjectCN=522a29533d3f200e2d1728300c141021081631313626321023042b113f2d26353224,POSTALCODE=10823,ST=0b1c1115005f5c4e140f09101c0411000c1d4f0716+ST=0b1c1115494a5c17161151151d135100034653465007170e1c520b071c040f0f5216050f1244171f0b110e04061211081e0347124308570a1e0c0b19560a055b0c0b0a070b80:04:9d:7c:7a:83:34:1a:72:18:08:25:d0:8f:54:65:a2:65:64:17:24:9e:1b:ec:08:00:07:f7:4a:26:b6:a1Signer
Actual PE Digest80:04:9d:7c:7a:83:34:1a:72:18:08:25:d0:8f:54:65:a2:65:64:17:24:9e:1b:ec:08:00:07:f7:4a:26:b6:a1Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindFirstFileW
WriteConsoleInputW
WriteConsoleOutputCharacterW
lstrlenA
GetDriveTypeW
CommConfigDialogA
GetConsoleAliasA
GetCurrentActCtx
SetDefaultCommConfigW
GetModuleHandleExW
WriteConsoleInputA
OpenSemaphoreA
GetSystemDefaultLCID
_lclose
CreateNamedPipeW
GenerateConsoleCtrlEvent
FindNextVolumeMountPointA
GetConsoleAliasesA
GetCompressedFileSizeW
GetConsoleAliasExesW
WaitNamedPipeW
GetCommandLineA
GetEnvironmentStrings
LoadLibraryW
GetLocaleInfoW
_hread
EnumSystemCodePagesA
GetConsoleAliasW
GetFileAttributesW
ReplaceFileW
ReadFile
QueryInformationJobObject
CompareStringW
lstrlenW
GetStartupInfoW
SetConsoleTitleA
GetShortPathNameA
FindResourceA
GetLastError
GetCurrentDirectoryW
SetLastError
ReadConsoleOutputCharacterA
AttachConsole
VerLanguageNameA
SetVolumeLabelW
RemoveDirectoryA
CopyFileA
FreeUserPhysicalPages
SetComputerNameA
GetProcessVersion
FindClose
UnhandledExceptionFilter
LocalAlloc
MoveFileA
CreateEventW
GetCommMask
SetThreadIdealProcessor
AddAtomA
SetCommMask
FindAtomA
FoldStringW
GetSystemInfo
FindNextFileA
GetModuleHandleA
GetCommTimeouts
lstrcatW
VirtualProtect
QueryPerformanceFrequency
ReadConsoleInputW
GetWindowsDirectoryW
MoveFileWithProgressW
GlobalAddAtomW
ResetWriteWatch
DeleteFileA
lstrcpyA
EnumSystemLocalesA
GetTempFileNameW
CreateFileW
WriteConsoleW
WideCharToMultiByte
HeapFree
HeapAlloc
GetProcAddress
GetModuleHandleW
ExitProcess
DecodePointer
EncodePointer
HeapReAlloc
GetCommandLineW
HeapSetInformation
IsProcessorFeaturePresent
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
HeapCreate
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
WriteFile
GetModuleFileNameW
Sleep
HeapSize
CloseHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
LCMapStringW
MultiByteToWideChar
GetStringTypeW
SetFilePointer
GetConsoleCP
GetConsoleMode
RaiseException
RtlUnwind
SetStdHandle
FlushFileBuffers
user32
CharUpperW
advapi32
AbortSystemShutdownA
winhttp
WinHttpWriteData
Sections
.text Size: 4.0MB - Virtual size: 4.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 3.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 15KB - Virtual size: 1.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ