Static task
static1
General
-
Target
0fcf082c6a7022d53cf4be98a1ecabc59873ecfba9e6bdd6d5629daf24ae366c
-
Size
4.1MB
-
MD5
e03c784653cc699a63d05325c6d0753c
-
SHA1
52adc4c5d10c57f5cc6735726721d9435f19d4a4
-
SHA256
0fcf082c6a7022d53cf4be98a1ecabc59873ecfba9e6bdd6d5629daf24ae366c
-
SHA512
877470a66d8a1f259d11562343405cc97cd7af165a1b8f73b6c70e35cd3b6e34a88a4d8eb3529e19fbc7f216b06b896f47a22a7678ba939bccb3f4c1fe03682e
-
SSDEEP
98304:MQ+DEkXGPIi2FlFtvj8QEEPH6YfCaIsFSWnhC:MQ+DYcBhjBEiH6Yfd/SWnhC
Malware Config
Signatures
Files
-
0fcf082c6a7022d53cf4be98a1ecabc59873ecfba9e6bdd6d5629daf24ae366c.exe windows:5 windows x86
57114c46aecdeaf532cc0492e16b25c7
Code Sign
f1:66:94:cd:33:c1:4a:53:95:16:d2:9b:21:7c:c3:33Certificate
IssuerCN=522b1f00070a2734475a3201002b1c42301c1b0732151b1d231030330b0713013107,POSTALCODE=10801,ST=0b1c1115005f5c4e140f090709110417101e115b0c1704+ST=0b1c1115494a5c141b55031011521200011110175651021a0c0100080654181701000b110407101e081204565401155144530712111a57090e5304000602055b0c0b0a070bNot Before01/11/2023, 10:30Not After31/10/2024, 10:30SubjectCN=522b1f00070a2734475a3201002b1c42301c1b0732151b1d231030330b0713013107,POSTALCODE=10801,ST=0b1c1115005f5c4e140f090709110417101e115b0c1704+ST=0b1c1115494a5c141b55031011521200011110175651021a0c0100080654181701000b110407101e081204565401155144530712111a57090e5304000602055b0c0b0a070b5a:8e:f7:54:1f:46:36:d9:9a:27:35:08:0c:29:68:43:24:a4:87:d5:27:fd:c0:68:1f:b7:88:70:b5:33:5c:d2Signer
Actual PE Digest5a:8e:f7:54:1f:46:36:d9:9a:27:35:08:0c:29:68:43:24:a4:87:d5:27:fd:c0:68:1f:b7:88:70:b5:33:5c:d2Digest Algorithmsha256PE Digest MatchestrueHeaders
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalCompact
WriteConsoleOutputCharacterA
ReadConsoleA
GetEnvironmentStringsW
GetUserDefaultLCID
SetConsoleScreenBufferSize
WriteConsoleInputA
GetNumaAvailableMemoryNode
OpenSemaphoreA
SetCommBreak
GetFileAttributesExA
SetTapeParameters
GetModuleHandleW
GenerateConsoleCtrlEvent
GetWindowsDirectoryA
GetConsoleAliasExesW
WaitNamedPipeW
FindActCtxSectionStringA
SetCommState
GetDriveTypeA
AddRefActCtx
GlobalFindAtomA
LoadLibraryW
CopyFileW
_hread
CreateEventA
GetFileAttributesA
SetConsoleMode
GetConsoleAliasW
SetSystemPowerState
TerminateProcess
ReplaceFileW
GetCompressedFileSizeA
GetTimeZoneInformation
lstrlenW
FindNextVolumeMountPointW
GetStartupInfoW
AllocConsole
GetShortPathNameA
GetConsoleAliasesW
FindFirstFileA
GetLastError
GetCurrentDirectoryW
SetLastError
CreateConsoleScreenBuffer
VerLanguageNameA
EnumSystemCodePagesW
SetStdHandle
GlobalGetAtomNameA
FindClose
LoadLibraryA
LocalAlloc
MoveFileA
AddVectoredExceptionHandler
RemoveDirectoryW
SetFileApisToANSI
WriteProfileSectionW
GetCurrentConsoleFont
FoldStringA
FindNextFileA
FindFirstChangeNotificationA
FindNextFileW
GetStringTypeW
VirtualProtect
CompareStringA
QueryPerformanceFrequency
FatalAppExitA
FindAtomW
DeleteFileW
MoveFileWithProgressW
AddConsoleAliasA
ResetWriteWatch
ReadConsoleOutputCharacterW
EnumSystemLocalesW
CloseHandle
LCMapStringW
WriteConsoleInputW
GetTempPathW
SetLocaleInfoA
HeapSize
IsProcessorFeaturePresent
MultiByteToWideChar
GetCommandLineW
HeapSetInformation
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
DecodePointer
GetCurrentProcess
HeapAlloc
SetFilePointer
HeapFree
GetProcAddress
ExitProcess
WriteFile
GetModuleFileNameW
FreeEnvironmentStringsW
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
RtlUnwind
FlushFileBuffers
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapReAlloc
WriteConsoleW
CreateFileW
user32
CharUpperA
advapi32
ClearEventLogA
AbortSystemShutdownW
winhttp
WinHttpWriteData
WinHttpGetProxyForUrl
Sections
.text Size: 4.0MB - Virtual size: 4.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 3.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 53KB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ