Static task
static1
General
-
Target
bfc858e006d490fe884162574cfbff1080e0731f9aab22d542ee49b06766ab22
-
Size
444KB
-
MD5
7b907746b8c5e0b87691e905ce439813
-
SHA1
cbbbac924433bfafbc8bf2b165e6fe02af96551d
-
SHA256
bfc858e006d490fe884162574cfbff1080e0731f9aab22d542ee49b06766ab22
-
SHA512
748e920d087a02404432d2d306fb7745a3126a1f0c1405e722f561e92c362b5f9d39312ea335f7b11bc76c5492c2adc1f9600ec1264b7a42144117648dfb10a7
-
SSDEEP
12288:e7ooAyPJfgIAPb7yQysiD+tV+PMwvvbcWR:e7XP2I87xymin
Malware Config
Signatures
Files
-
bfc858e006d490fe884162574cfbff1080e0731f9aab22d542ee49b06766ab22.exe windows x86
249133e0fde99bb33679857440809c13
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EnumDateFormatsW
FindNextFileW
CopyFileExA
DnsHostnameToComputerNameW
VerifyVersionInfoA
ReadConsoleOutputCharacterW
FlushConsoleInputBuffer
LockFile
GetProfileSectionA
QueryDosDeviceW
IsSystemResumeAutomatic
SetProcessPriorityBoost
GlobalGetAtomNameW
lstrlenA
FindNextVolumeMountPointW
GlobalDeleteAtom
WriteConsoleInputA
FindResourceA
GetComputerNameExW
OpenEventA
CallNamedPipeA
GetModuleHandleA
GetSystemDirectoryA
SetCurrentDirectoryW
BuildCommDCBAndTimeoutsA
GetProcAddress
LoadLibraryA
MoveFileWithProgressW
GetCommandLineA
InterlockedDecrement
GetCalendarInfoW
SearchPathA
CreateActCtxA
FormatMessageA
EnterCriticalSection
GetSystemDefaultLangID
GetConsoleAliasesLengthA
WriteProfileSectionA
AddAtomA
InterlockedIncrement
HeapSize
_hwrite
InterlockedCompareExchange
GetStartupInfoA
CreateMailslotW
IsDBCSLeadByteEx
GetSystemWow64DirectoryA
GetLastError
GetPrivateProfileIntA
GetConsoleAliasExesLengthA
WriteConsoleInputW
GetTickCount
LoadLibraryW
GetModuleHandleW
VirtualProtect
GetOEMCP
GetMailslotInfo
GetDiskFreeSpaceExA
WriteConsoleW
EnumSystemLocalesA
LocalFileTimeToFileTime
SearchPathW
GetComputerNameExA
FindNextFileA
ResetEvent
CreateMutexA
FindResourceW
SetCommState
InterlockedExchangeAdd
ConvertThreadToFiber
GetConsoleSelectionInfo
LocalAlloc
lstrcpyA
HeapAlloc
GetFileAttributesA
GetSystemWindowsDirectoryA
GetAtomNameA
ReadConsoleInputA
GetComputerNameA
GetPrivateProfileStructW
LocalUnlock
OpenWaitableTimerA
FillConsoleOutputCharacterW
FindNextVolumeMountPointA
GetFullPathNameW
GetThreadPriority
MapUserPhysicalPages
WriteConsoleOutputCharacterA
OpenJobObjectW
CreateFileA
BuildCommDCBAndTimeoutsW
SetCalendarInfoW
GetFileSizeEx
GetDefaultCommConfigA
GetConsoleAliasesLengthW
LocalFlags
DebugBreak
lstrcatA
Sleep
InitializeCriticalSection
DeleteCriticalSection
LeaveCriticalSection
RaiseException
RtlUnwind
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetModuleFileNameW
WideCharToMultiByte
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetCPInfo
HeapValidate
IsBadReadPtr
TlsGetValue
TlsAlloc
TlsSetValue
GetCurrentThreadId
TlsFree
SetLastError
GetStdHandle
WriteFile
OutputDebugStringA
GetFileType
OutputDebugStringW
ExitProcess
GetACP
IsValidCodePage
CloseHandle
GetModuleFileNameA
SetHandleCount
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapDestroy
HeapCreate
HeapFree
VirtualFree
FlushFileBuffers
GetConsoleCP
GetConsoleMode
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
HeapReAlloc
VirtualAlloc
IsValidLocale
GetUserDefaultLCID
InitializeCriticalSectionAndSpinCount
SetStdHandle
SetFilePointer
WriteConsoleA
GetConsoleOutputCP
GetLocaleInfoW
ReadFile
DeleteFileA
user32
GetMenuInfo
LoadMenuA
CharUpperA
GetCursorInfo
advapi32
ImpersonateNamedPipeClient
AbortSystemShutdownA
Sections
.text Size: 221KB - Virtual size: 220KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 173KB - Virtual size: 261KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 49KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ