Static task
static1
General
-
Target
7dc63527cec7b55e496323545391b2107bfdd3d17c36654bb77c15a1b3d99f4b
-
Size
310KB
-
MD5
c1cfed7289ee988faef177e3ec37e5bf
-
SHA1
90888ddfc5af6ba4f1104303fadf047d0a88821a
-
SHA256
7dc63527cec7b55e496323545391b2107bfdd3d17c36654bb77c15a1b3d99f4b
-
SHA512
e512dfdaa62ec1f8e4ed88789e162dfdd3762129a2e11222fb9d9ac973b9de3ed75a99b036c9d422c5a07c4bb8423aad2177b7c67ef6fcdee9801990b1956b80
-
SSDEEP
6144:UCQ3F8QUSO+we9arTooqXz9zTX47Uwrad4I/oaONS:UCQKQFL39arTooqXz9z65radLO
Malware Config
Signatures
Files
-
7dc63527cec7b55e496323545391b2107bfdd3d17c36654bb77c15a1b3d99f4b.exe windows x86
3bfd7473e430500ed1d2bf7635bb6b63
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcatA
FindFirstChangeNotificationA
GetNamedPipeHandleStateW
GetOverlappedResult
FillConsoleOutputCharacterW
GetQueuedCompletionStatus
TerminateProcess
GetCurrentProcessId
FindNextFileA
CopyFileExA
BuildCommDCBAndTimeoutsA
EnumDateFormatsA
GetVersionExW
VirtualLock
WriteProfileStringW
VerifyVersionInfoA
GetProcessPriorityBoost
GetPriorityClass
GetCompressedFileSizeW
FindNextVolumeMountPointW
OutputDebugStringW
GetWriteWatch
WriteConsoleInputA
GetConsoleTitleA
SetComputerNameExW
GetTimeZoneInformation
LoadLibraryW
GetSystemDirectoryW
GetDriveTypeA
GetModuleHandleA
GlobalAlloc
GetShortPathNameA
ZombifyActCtx
GetProfileSectionA
DeleteFileW
GetCommandLineW
ReadConsoleOutputCharacterA
GetCalendarInfoW
ReleaseActCtx
FindResourceA
FormatMessageW
GetModuleFileNameA
CreateJobObjectW
EnterCriticalSection
SetFirmwareEnvironmentVariableA
GetDllDirectoryW
GetExitCodeThread
LoadLibraryA
WritePrivateProfileStringA
GetConsoleAliasesLengthW
WriteProfileSectionA
InterlockedDecrement
AddAtomW
UpdateResourceA
GetVersionExA
InterlockedExchangeAdd
GetStartupInfoW
ConnectNamedPipe
GetConsoleAliasExesW
DebugBreak
EndUpdateResourceA
GetLastError
GetSystemWindowsDirectoryW
GetSystemWow64DirectoryW
GetCPInfoExA
GetStringTypeExW
DeleteVolumeMountPointA
FatalAppExitA
SetSystemTime
OpenFileMappingW
lstrcmpA
SetConsoleCursorPosition
SetDefaultCommConfigW
GetACP
GetCurrencyFormatA
CreateActCtxW
GetTapeParameters
GetMailslotInfo
GetConsoleAliasW
_lwrite
GetDiskFreeSpaceExA
DefineDosDeviceW
GetAtomNameA
FlushConsoleInputBuffer
EnumResourceTypesA
lstrlenW
GetLongPathNameW
CreateJobSet
WriteConsoleW
VirtualProtect
ReadConsoleOutputW
SuspendThread
BuildCommDCBW
GetStringTypeW
GetHandleInformation
GetComputerNameW
WritePrivateProfileSectionA
WritePrivateProfileStructA
TryEnterCriticalSection
GetPrivateProfileSectionNamesA
CopyFileW
MoveFileA
GetVolumePathNameA
SetConsoleMode
HeapWalk
FindNextFileW
ResetEvent
ReadProcessMemory
MoveFileExA
GetVersion
ChangeTimerQueueTimer
WriteConsoleInputW
InterlockedCompareExchange
GetCommMask
SetFileShortNameA
lstrcpyW
VerLanguageNameA
FreeEnvironmentStringsA
EnumDateFormatsExW
GetProfileStringA
GlobalGetAtomNameW
GetConsoleAliasesA
CreateMailslotW
SetConsoleOutputCP
MoveFileWithProgressW
GetFileInformationByHandle
GetLocalTime
FoldStringW
EnumSystemLocalesW
CallNamedPipeW
GetConsoleAliasExesLengthA
OpenSemaphoreW
GetPrivateProfileIntA
GetModuleHandleExW
WriteConsoleOutputCharacterW
SetComputerNameW
FindActCtxSectionStringW
GetTickCount
FreeLibraryAndExitThread
_hwrite
GetUserDefaultLangID
LocalLock
FindFirstVolumeW
FindClose
OpenWaitableTimerW
EnumResourceNamesA
OpenFileMappingA
GetFileType
QueueUserWorkItem
RaiseException
lstrcpynA
GetFullPathNameA
SetThreadPriority
ReadConsoleA
AssignProcessToJobObject
CreateFileW
GetDateFormatA
DeactivateActCtx
SetCurrentDirectoryW
GetFileAttributesA
GetBinaryTypeW
SetCalendarInfoW
InterlockedIncrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleFileNameW
RtlUnwind
HeapValidate
IsBadReadPtr
GetProcAddress
TlsGetValue
GetModuleHandleW
TlsAlloc
TlsSetValue
GetCurrentThreadId
TlsFree
SetLastError
GetStdHandle
WriteFile
OutputDebugStringA
ExitProcess
QueryPerformanceCounter
GetSystemTimeAsFileTime
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetStartupInfoA
HeapDestroy
HeapCreate
HeapFree
VirtualFree
FlushFileBuffers
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
HeapAlloc
HeapSize
HeapReAlloc
VirtualAlloc
GetOEMCP
GetCPInfo
IsValidCodePage
InitializeCriticalSectionAndSpinCount
MultiByteToWideChar
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
SetFilePointer
LCMapStringA
LCMapStringW
GetStringTypeA
GetLocaleInfoA
ReadFile
CloseHandle
CreateFileA
DeleteFileA
Sections
.text Size: 220KB - Virtual size: 219KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 70KB - Virtual size: 713KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pahojap Size: 512B - Virtual size: 5B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.wesovu Size: 512B - Virtual size: 75B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.fovugug Size: 512B - Virtual size: 34B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ