Static task
static1
General
-
Target
dcdb1efb61ecf52af046b43b085cf53c8831b6d5ad890fd3e2d490265417727f.zip
-
Size
128KB
-
MD5
a0ee0434d4047aa7caa52e5ecd2ff3b3
-
SHA1
dfecbf0a284a2f9fbc62071e08e9c78f66ae72ab
-
SHA256
154f9187d8c16ea0c8a26f1b2d3c25ce7080d4b8c4a20ea810b9d1bc86ea26e3
-
SHA512
7521b379e8fb185e50f56e117909bc6932b2ca1f318f373638ff75452e8964ace65e3d236b69e2ebb725b53292aa37d01cc92c835372653f95d5f9e1c65570f6
-
SSDEEP
3072:9vDTURPrPe3Yt3FUnD50QuZphwcNa2llc6OzDaasDkNRRgrCs9kUpi:9vDwVGg3oApht4C2naasANRRk59kmi
Malware Config
Signatures
Files
-
dcdb1efb61ecf52af046b43b085cf53c8831b6d5ad890fd3e2d490265417727f.zip.zip
Password: infected
-
dcdb1efb61ecf52af046b43b085cf53c8831b6d5ad890fd3e2d490265417727f.exe.exe windows x86
f2fff7b5726c9a0e6527dfcd912d5711
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FoldStringW
UnlockFile
OpenWaitableTimerA
CreateEventA
ReadConsoleInputA
WaitNamedPipeW
CommConfigDialogA
SetSystemTimeAdjustment
SearchPathW
EnumResourceTypesA
DeleteFileW
GetConsoleAliasesLengthW
FillConsoleOutputCharacterA
WriteConsoleOutputCharacterW
LocalAlloc
GetProcAddress
GetModuleHandleW
VirtualAlloc
LoadLibraryA
ZombifyActCtx
GetConsoleAliasA
FindFirstChangeNotificationA
GetModuleHandleA
EnumResourceNamesW
GetCalendarInfoW
CommConfigDialogW
lstrcpynW
AddAtomA
SetConsoleCtrlHandler
GetLongPathNameW
GetSystemDefaultLCID
GetSystemDefaultLangID
GetLastError
FindNextFileA
GetPriorityClass
SetConsoleCursorInfo
OpenJobObjectW
InitializeCriticalSection
FindResourceExW
GetConsoleMode
_hwrite
GlobalWire
GetComputerNameW
VerifyVersionInfoA
SetFileShortNameA
GetVolumeNameForVolumeMountPointW
GetFileAttributesExA
SetComputerNameW
GetFileAttributesW
ReadConsoleA
WritePrivateProfileStringW
CreateFileA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetCommandLineA
GetStartupInfoA
RaiseException
SetHandleCount
GetStdHandle
GetFileType
DeleteCriticalSection
SetFilePointer
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EnterCriticalSection
LeaveCriticalSection
Sleep
ExitProcess
WriteFile
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapCreate
VirtualFree
HeapFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
InitializeCriticalSectionAndSpinCount
SetStdHandle
RtlUnwind
ReadFile
HeapAlloc
HeapReAlloc
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
GetConsoleCP
FlushFileBuffers
HeapSize
CloseHandle
user32
ScreenToClient
gdi32
GetCharWidth32A
GetFontLanguageInfo
winhttp
WinHttpReadData
msimg32
AlphaBlend
Sections
.text Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 74KB - Virtual size: 39.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ