Static task
static1
General
-
Target
3c3a40d701f5d118f2f016b503f0adfb9824199718ed6f96f3f443127eb17d76
-
Size
460KB
-
MD5
91e1ecff7a675f2681e25ed1bdcef9fd
-
SHA1
26ec482f948f2de9d7b17c0d204507aa9150737c
-
SHA256
3c3a40d701f5d118f2f016b503f0adfb9824199718ed6f96f3f443127eb17d76
-
SHA512
5cc385bea0bf21d1eb7a73f726898139f3776a136f9a6065263bded74b5638fcee229f22107c52cba9a527ace35e085e17ad57a6c92c2cd9e5e17fc025d397e2
-
SSDEEP
12288:8aVrx8KTdfZgMvDoWQDUEOHcKReREQbN3x2aVD+:8sxPTdfZfJVHcKP
Malware Config
Signatures
Files
-
3c3a40d701f5d118f2f016b503f0adfb9824199718ed6f96f3f443127eb17d76.exe windows x86
836e0c9b4a8110c512055b98bcd30141
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42u
ord1739
ord5573
ord3167
ord5649
ord4414
ord4947
ord4852
ord2391
ord4381
ord3449
ord3193
ord6076
ord6171
ord2977
ord3142
ord3254
ord4459
ord3131
ord3257
ord2980
ord3076
ord2971
ord3825
ord3826
ord3820
ord3074
ord4075
ord4617
ord4420
ord338
ord825
ord652
ord4817
ord1834
ord4237
ord2715
ord2382
ord3054
ord5094
ord5097
ord4461
ord4298
ord3345
ord5006
ord975
ord5468
ord3398
ord2874
ord2873
ord4146
ord6051
ord4072
ord1768
ord4401
ord5233
ord2377
ord5157
ord6370
ord4347
ord5278
ord2641
ord1658
ord3793
ord4831
ord4430
ord2640
ord2047
ord6372
ord3744
ord5059
ord1720
ord2438
ord2116
ord5273
ord4621
ord4421
ord366
ord674
ord5248
ord4407
ord4451
ord1937
ord5736
ord4583
ord4582
ord4893
ord4364
ord4886
ord5070
ord4335
ord4343
ord4717
ord4884
ord4525
ord4539
ord4537
ord4520
ord4523
ord4518
ord4958
ord4955
ord4103
ord4073
ord5236
ord5286
ord4435
ord3743
ord1719
ord4426
ord560
ord813
ord5256
ord4606
ord4604
ord4269
ord6371
ord4480
ord2546
ord2504
ord5727
ord3917
ord1089
ord5193
ord2388
ord3341
ord5296
ord5298
ord2717
ord4074
ord4692
ord5303
ord5285
ord5710
ord4616
ord4418
ord3733
ord561
ord815
ord6211
ord617
ord5297
ord5208
ord296
ord986
ord520
ord6113
ord4154
ord5261
ord4370
ord4847
ord4992
ord4704
ord2506
ord6048
ord1767
ord5237
ord5276
ord5257
ord4419
ord3592
ord324
ord641
ord4229
ord1569
ord5239
ord2534
ord2502
ord6332
ord3060
ord3053
ord4690
ord4233
ord1165
ord1817
ord4268
ord823
msvcrt
malloc
free
__CxxFrameHandler
sprintf
time
printf
_exit
_XcptFilter
exit
_wcmdln
__wgetmainargs
__setusermatherr
_adjust_fdiv
__p__commode
_controlfp
_onexit
__dllonexit
_except_handler3
__set_app_type
__p__fmode
_initterm
kernel32
GetLastError
GetCurrentProcess
GetModuleFileNameA
VirtualFree
LoadLibraryA
GetProcAddress
VirtualAlloc
GetModuleHandleW
GetStartupInfoW
TerminateProcess
user32
FindWindowW
IsRectEmpty
GetDesktopWindow
GetSysColorBrush
IsIconic
GetParent
GetCursor
GetWindowContextHelpId
FindWindowA
OffsetRect
LoadImageA
LoadCursorFromFileW
WindowFromPoint
GetClassLongA
GetClassNameA
LoadIconW
LoadCursorA
GetCursorPos
GetLastActivePopup
GetWindowThreadProcessId
LoadCursorW
GetShellWindow
GetWindowRect
LoadIconA
UpdateWindow
ChildWindowFromPoint
GetSubMenu
CheckRadioButton
IsMenu
GetMenuCheckMarkDimensions
GetWindowTextW
IsWindow
GetSystemMenu
IsCharAlphaA
GetMessageExtraInfo
GetUpdateRect
GetDlgItemTextA
GetMenuItemID
GetPropA
IsCharUpperA
IsWindowVisible
GetNextDlgTabItem
GetPropW
GetWindowTextLengthW
GetMessagePos
IsCharAlphaNumericA
IsWindowUnicode
GetDlgItem
GetDlgCtrlID
GetWindowTextLengthA
wsprintfA
GetMenuItemCount
GetProcessWindowStation
GetWindowLongW
ClientToScreen
GetClientRect
GetMenuContextHelpId
UnionRect
IntersectRect
PtInRect
SubtractRect
LoadImageW
GetCaretPos
LoadBitmapA
GetCaretBlinkTime
GetClassNameW
InflateRect
CheckMenuRadioItem
LoadCursorFromFileA
GetClipCursor
CopyRect
LoadBitmapW
GetSysColor
GetProcessDefaultLayout
GetClassWord
GetWindowLongA
ScreenToClient
GetTopWindow
EqualRect
EnableWindow
GetDoubleClickTime
IsCharLowerW
GetMenuStringA
GetInputState
GetCapture
GetActiveWindow
CountClipboardFormats
GetForegroundWindow
CreateWindowExA
IsCharLowerA
GetMenuStringW
GetDialogBaseUnits
GetClassLongW
msvcp60
??1_Lockit@std@@QAE@XZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
??_D?$basic_ifstream@DU?$char_traits@D@std@@@std@@QAEXXZ
??1?$basic_filebuf@DU?$char_traits@D@std@@@std@@UAE@XZ
??1?$basic_istream@DU?$char_traits@D@std@@@std@@UAE@XZ
??1?$basic_ios@DU?$char_traits@D@std@@@std@@UAE@XZ
??1?$basic_ifstream@DU?$char_traits@D@std@@@std@@UAE@XZ
?clear@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z
?close@?$basic_filebuf@DU?$char_traits@D@std@@@std@@QAEPAV12@XZ
?read@?$basic_istream@DU?$char_traits@D@std@@@std@@QAEAAV12@PADH@Z
?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QAEXH_N@Z
?open@?$basic_filebuf@DU?$char_traits@D@std@@@std@@QAEPAV12@PBDH@Z
??_7?$basic_ifstream@DU?$char_traits@D@std@@@std@@6B@
??0?$basic_filebuf@DU?$char_traits@D@std@@@std@@QAE@PAU_iobuf@@@Z
??0?$basic_istream@DU?$char_traits@D@std@@@std@@QAE@PAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z
?_Fpz@std@@3_JB
??0_Lockit@std@@QAE@XZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??_8?$basic_ifstream@DU?$char_traits@D@std@@@std@@7B@
??0ios_base@std@@IAE@XZ
??_7?$basic_ios@DU?$char_traits@D@std@@@std@@6B@
shlwapi
StrCSpnIA
PathIsPrefixA
StrCmpNIA
PathIsNetworkPathA
PathUnquoteSpacesW
PathSkipRootW
PathIsURLA
PathUndecorateW
StrCmpNIW
StrCmpNW
PathIsNetworkPathW
PathIsDirectoryW
PathSkipRootA
PathIsSystemFolderA
PathIsRootA
PathStripPathW
PathRemoveExtensionA
PathIsFileSpecW
PathIsRelativeA
PathIsUNCA
PathIsRelativeW
PathUnquoteSpacesA
PathIsPrefixW
PathIsSameRootA
PathRemoveFileSpecW
PathIsSystemFolderW
StrCmpNA
StrCSpnA
StrCSpnIW
PathIsUNCW
PathIsURLW
PathRemoveBlanksW
StrChrW
StrCSpnW
PathIsDirectoryA
Sections
.text Size: 32KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 372KB - Virtual size: 368KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.test0 Size: 4KB - Virtual size: 79B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.test1 Size: 4KB - Virtual size: 37B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.test2 Size: 4KB - Virtual size: 44B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.test3 Size: 4KB - Virtual size: 46B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.test4 Size: 4KB - Virtual size: 108B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ