Static task
static1
General
-
Target
2c83b506a4a8d68478588340361759c8beb9b1436477731d24798c34864da4dd
-
Size
286KB
-
MD5
daaf12a5294d351d43dbd52d42368c67
-
SHA1
d94ded4c33a8f916be546bb9feecb67774b0d42a
-
SHA256
2c83b506a4a8d68478588340361759c8beb9b1436477731d24798c34864da4dd
-
SHA512
f6c408f5baa57fa736be90ed973d771aca40d2814e47d0c7c5a51e5f4a403511b672060db1fbfbfc4de38c6c0539dfa7fe1083634dd5668f396c5f65add464bc
-
SSDEEP
6144:TD1IM/wYBma7l/zwV2tyeBdq85VzEX544G:TDJLBma7l/zHddq85ei
Malware Config
Signatures
Files
-
2c83b506a4a8d68478588340361759c8beb9b1436477731d24798c34864da4dd.exe windows x86
d16b449ac6356f89498f6db2ceb841d8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcatA
FindFirstChangeNotificationW
GetNamedPipeHandleStateW
CreateIoCompletionPort
FillConsoleOutputCharacterA
DisableThreadLibraryCalls
TerminateProcess
GetCurrentProcessId
GetVersionExA
EnumDateFormatsA
FindNextFileW
CopyFileExA
BuildCommDCBAndTimeoutsA
VirtualUnlock
WriteProfileStringA
VerifyVersionInfoA
SetProcessPriorityBoost
GetDriveTypeW
GetPriorityClass
GetCompressedFileSizeA
FindNextVolumeMountPointW
OutputDebugStringA
GetWriteWatch
WriteConsoleInputA
WriteConsoleInputW
GetConsoleTitleA
SetComputerNameExW
GetTimeZoneInformation
LoadLibraryW
GetSystemDirectoryA
GetDriveTypeA
LoadLibraryA
GetShortPathNameA
ActivateActCtx
GetProfileSectionW
DeleteFileW
GetCommandLineA
InterlockedExchangeAdd
ReleaseActCtx
FindResourceW
FormatMessageA
GetModuleFileNameW
CreateJobObjectW
InitializeCriticalSection
SetFirmwareEnvironmentVariableW
GetDllDirectoryA
GetExitCodeThread
GetNamedPipeHandleStateA
WritePrivateProfileStringW
GetConsoleAliasesLengthW
WriteProfileSectionA
AddAtomA
UpdateResourceW
InterlockedDecrement
HeapSize
_hwrite
InterlockedExchange
GetStartupInfoW
DisconnectNamedPipe
GetCPInfoExA
GetSystemWow64DirectoryW
SetLastError
GetConsoleAliasExesA
DebugBreak
EndUpdateResourceW
GetLastError
GetStringTypeExW
GetConsoleAliasesLengthA
DeleteVolumeMountPointW
FatalAppExitA
ProcessIdToSessionId
lstrcmpW
SetConsoleCursorPosition
SetDefaultCommConfigA
VirtualAlloc
GetOEMCP
CreateActCtxW
GetMailslotInfo
GetConsoleAliasA
_lwrite
GetDiskFreeSpaceExA
AddVectoredExceptionHandler
WriteConsoleA
VirtualProtect
ReadConsoleOutputA
GetThreadContext
BuildCommDCBA
GetHandleInformation
GetComputerNameA
WritePrivateProfileSectionW
TryEnterCriticalSection
GetPrivateProfileSectionNamesA
OpenWaitableTimerW
CopyFileW
MoveFileW
GetVolumePathNameA
GetConsoleMode
HeapWalk
SetComputerNameA
FindNextFileA
SetEvent
UnlockFileEx
MoveFileA
GetProcAddress
GetOverlappedResult
DeleteTimerQueueTimer
VerifyVersionInfoW
GlobalAlloc
SetCommMask
SetFileShortNameW
FreeEnvironmentStringsW
FindActCtxSectionStringW
GetSystemWindowsDirectoryA
GetProfileStringW
GlobalGetAtomNameA
SetComputerNameW
GetConsoleAliasesA
CreateMailslotW
EnumDateFormatsW
GetConsoleOutputCP
MoveFileWithProgressA
SetLocalTime
FoldStringA
CallNamedPipeA
GetConsoleAliasExesLengthW
FindActCtxSectionStringA
CopyFileExW
OpenSemaphoreA
GetModuleHandleExA
WriteConsoleOutputCharacterA
GetFileAttributesA
GetTickCount
LocalUnlock
GetFileTime
EnumResourceNamesW
OpenFileMappingA
GetFileType
RaiseException
ReadConsoleA
GetFileInformationByHandle
InterlockedIncrement
Sleep
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
RtlUnwind
DeleteFileA
HeapValidate
IsBadReadPtr
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
IsDebuggerPresent
GetModuleHandleA
TlsGetValue
GetModuleHandleW
TlsAlloc
TlsSetValue
GetCurrentThreadId
TlsFree
GetACP
GetCPInfo
IsValidCodePage
SetHandleCount
GetStdHandle
GetStartupInfoA
QueryPerformanceCounter
GetSystemTimeAsFileTime
ExitProcess
GetEnvironmentStringsW
GetCommandLineW
HeapDestroy
HeapCreate
HeapFree
VirtualFree
GetModuleFileNameA
WriteFile
HeapAlloc
HeapReAlloc
FlushFileBuffers
WideCharToMultiByte
GetConsoleCP
WriteConsoleW
OutputDebugStringW
InitializeCriticalSectionAndSpinCount
MultiByteToWideChar
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
LCMapStringA
LCMapStringW
SetFilePointer
SetStdHandle
ReadFile
CloseHandle
CreateFileA
user32
CharUpperA
Sections
.text Size: 200KB - Virtual size: 200KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 69KB - Virtual size: 7.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.dik Size: 512B - Virtual size: 5B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rena Size: 512B - Virtual size: 74B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ