hohraoric
Static task
static1
Behavioral task
behavioral1
Sample
fd2b5e7aae105e7ca38c2b6c53a88cf2c6b3b1bf0217372339e836615a6095c9.dll
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fd2b5e7aae105e7ca38c2b6c53a88cf2c6b3b1bf0217372339e836615a6095c9.dll
Resource
win10v2004-20220901-en
General
-
Target
fd2b5e7aae105e7ca38c2b6c53a88cf2c6b3b1bf0217372339e836615a6095c9
-
Size
491KB
-
MD5
9d47762583e9badaab477cc28cb4b550
-
SHA1
c61a87ad9e6d7818d7f3dd932fed7f3e7f364a6a
-
SHA256
fd2b5e7aae105e7ca38c2b6c53a88cf2c6b3b1bf0217372339e836615a6095c9
-
SHA512
9508744b02740f3ec217ce281cde489a8d26cfa7f433a53ed6b68a6db53582b9e4c1a7a4a8a92e34f2930134374a4499907db608338b378a835b1876af8704f9
-
SSDEEP
6144:ZproEIgm2n6bXXCUPZwQ61vBQrKwHTn2FfVlBSXB82DOOZBuhg1xKr2VdmlW/2l8:vGrRrwvGufGvuSi2H9Voox2KxZv
Malware Config
Signatures
Files
-
fd2b5e7aae105e7ca38c2b6c53a88cf2c6b3b1bf0217372339e836615a6095c9.dll windows x86
82984a362a5495889282142920a4223a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
CreateFileA
DisableThreadLibraryCalls
DisconnectNamedPipe
FatalAppExitW
FindFirstChangeNotificationW
GetConsoleFontSize
GetFileAttributesA
GetFileSize
GetModuleHandleA
GetOverlappedResult
GetProcAddress
GetSystemTimeAsFileTime
GetTempFileNameA
GetTempPathA
InterlockedCompareExchange
InterlockedDecrement
InterlockedExchange
InterlockedExchangeAdd
InterlockedIncrement
IsBadHugeWritePtr
IsDebuggerPresent
LocalFree
MapViewOfFileEx
ReadFile
SetEvent
SetHandleCount
SetWaitableTimer
WaitForSingleObject
lstrcpyW
lstrlenA
FindResourceExA
FormatMessageW
FreeLibrary
GetComputerNameW
GetStringTypeW
GetThreadSelectorEntry
GlobalAlloc
GlobalFree
HeapUnlock
IsBadStringPtrA
IsBadWritePtr
IsValidLocale
LoadLibraryW
SetSystemTimeAdjustment
Thread32Next
WaitForDebugEvent
WriteConsoleOutputCharacterW
_lclose
lstrcpynA
GetFileSizeEx
GetLargestConsoleWindowSize
GetStdHandle
LocalAlloc
Sleep
VirtualProtectEx
WideCharToMultiByte
WriteConsoleW
WriteFile
VirtualAlloc
DosDateTimeToFileTime
FindClose
GetConsoleAliasExesW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetSystemInfo
GetSystemTimeAdjustment
GetTickCount
GetTimeZoneInformation
GetVersionExA
GlobalUnlock
IsDBCSLeadByteEx
LocalCompact
LocalReAlloc
MoveFileA
MulDiv
QueryPerformanceCounter
ResumeThread
ScrollConsoleScreenBufferA
SetConsoleMode
SetLocaleInfoA
SetUnhandledExceptionFilter
TerminateProcess
TlsSetValue
UnhandledExceptionFilter
WriteProfileSectionA
CompareFileTime
CompareStringW
CopyFileExA
CreateEventW
CreateFileMappingW
CreateFileW
CreateTapePartition
CreateTimerQueue
EnumResourceTypesW
GetComputerNameExW
GetConsoleAliasA
GetConsoleAliasesW
GetCurrencyFormatA
GetEnvironmentVariableA
GetFileAttributesW
GetFileTime
GetFullPathNameA
GetModuleFileNameW
GetModuleHandleW
GetNamedPipeHandleStateA
GetPrivateProfileIntW
GetPrivateProfileSectionW
GetProcessHeaps
GetSystemTime
GetTapeStatus
GetTimeFormatW
GetVersion
LocalFlags
MapViewOfFile
MultiByteToWideChar
OpenProcess
OutputDebugStringA
PrepareTape
ReadConsoleOutputCharacterA
ReleaseMutex
ReplaceFile
SetConsoleOutputCP
SetMessageWaitingIndicator
SetProcessWorkingSetSize
SignalObjectAndWait
SwitchToFiber
SystemTimeToFileTime
UnmapViewOfFile
VirtualQuery
DuplicateHandle
FreeUserPhysicalPages
HeapWalk
SetLocaleInfoW
GetFileType
GetStartupInfoA
DeleteCriticalSection
TlsGetValue
TlsAlloc
TlsFree
SetLastError
GetLastError
GetCurrentThread
GetLocalTime
HeapFree
HeapAlloc
ReadConsoleInputA
GetConsoleMode
PeekConsoleInputA
GetNumberOfConsoleInputEvents
GetTimeFormatA
GetDateFormatA
ExitProcess
FileTimeToSystemTime
FileTimeToLocalFileTime
FindFirstFileA
FindNextFileA
GetCurrentDirectoryA
SetCurrentDirectoryA
LCMapStringW
WriteConsoleA
GetConsoleOutputCP
VirtualFree
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
SetLocalTime
GetCommandLineA
SetStdHandle
EnterCriticalSection
LeaveCriticalSection
HeapValidate
SetErrorMode
GetFullPathNameW
GetDriveTypeW
FindFirstFileW
RtlUnwind
InitializeCriticalSectionAndSpinCount
FatalAppExitA
HeapCreate
HeapDestroy
GetModuleFileNameA
RaiseException
GetConsoleCP
FlushFileBuffers
HeapSize
SetConsoleCtrlHandler
LoadLibraryA
ReadConsoleA
ReadConsoleW
ReadConsoleInputW
SetFilePointer
GetFileInformationByHandle
PeekNamedPipe
GetStringTypeA
CompareStringA
LCMapStringA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetDriveTypeA
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
GetExitCodeProcess
CreateProcessW
GetLocaleInfoW
SetEndOfFile
GetProcessHeap
SetFileTime
LocalFileTimeToFileTime
CreateProcessA
SetEnvironmentVariableA
SetEnvironmentVariableW
user32
FlashWindow
MonitorFromWindow
SwapMouseButton
AnyPopup
CloseWindow
DdeAccessData
DdeConnectList
EnumDisplaySettingsW
FindWindowExA
GetClassInfoExA
GetUserObjectInformationW
GetWindowThreadProcessId
InternalGetWindowText
IsCharAlphaW
LoadCursorW
MessageBoxW
SetMenuItemInfoA
SetUserObjectInformationA
OemToCharBuffA
CharToOemBuffA
CharToOemW
CopyAcceleratorTableW
DialogBoxIndirectParamW
GetListBoxInfo
GetTabbedTextExtentW
IsCharLowerW
IsCharUpperA
RegisterClipboardFormatA
SetClipboardData
SetCursor
TranslateMDISysAccel
UnregisterDeviceNotification
CallWindowProcW
ChangeClipboardChain
ChangeDisplaySettingsExW
CheckDlgButton
CloseDesktop
CopyRect
CreateCaret
CreateIcon
CreateWindowStationA
DlgDirListA
DrawIconEx
FindWindowA
GetCursor
GetInputDesktop
GetKeyNameTextW
GetMonitorInfoW
GetParent
GetPropA
GetUpdateRect
GetUpdateRgn
GetWindowContextHelpId
IMPSetIMEA
LoadMenuW
MonitorFromRect
PostMessageW
RegisterClipboardFormatW
ReuseDDElParam
SendDlgItemMessageW
SendIMEMessageExA
SendMessageW
SendNotifyMessageA
SetCaretPos
SetDeskWallpaper
SetProcessWindowStation
UpdateWindow
wsprintfW
SetPropA
Exports
Exports
Sections
.text Size: 373KB - Virtual size: 372KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 82KB - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 21KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ