Static task
static1
General
-
Target
849d5c0a5baffe2d7307d123c637ae087119f5de75b786ba6d97ac440745c91d
-
Size
420KB
-
MD5
61c39e46a729679caf792b94616f4130
-
SHA1
8c4280d5717f776465a83a731932b9383484e7d9
-
SHA256
849d5c0a5baffe2d7307d123c637ae087119f5de75b786ba6d97ac440745c91d
-
SHA512
39b965328e86fb22c600be72b91128699172fb0ea93b1f0e56b035dd2307727da1edfa41ae3ee64838dc95f3efd411bf9f06e7254fe47a73e4980fe339f8c3bb
-
SSDEEP
6144:tX8xLtsR7qBxXLrheEyAPvLLUSnylxCkd9lQcpQy+aL6r5gq+:tX8xJW7AR8BAPvsSun/Ky+E6r5
Malware Config
Signatures
Files
-
849d5c0a5baffe2d7307d123c637ae087119f5de75b786ba6d97ac440745c91d.exe windows x86
aa60e70795d973723830cf7229b55a64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualProtect
GetConsoleAliasA
SetComputerNameA
GetSystemWindowsDirectoryW
GlobalUnlock
FindFirstVolumeMountPointW
CreateDirectoryExW
DeleteAtom
GetLogicalDriveStringsW
ReadConsoleInputA
GetTempPathW
GetCurrentDirectoryW
WaitForDebugEvent
LCMapStringW
GetProcAddress
GetModuleHandleA
LocalAlloc
GetBinaryTypeA
SearchPathW
VerifyVersionInfoW
GetHandleInformation
EndUpdateResourceW
FindNextFileA
FindFirstVolumeA
LocalFlags
LoadLibraryW
GlobalFlags
CreateFileW
CreateActCtxW
lstrlenA
UpdateResourceA
CreateActCtxA
DeleteVolumeMountPointA
MoveFileWithProgressA
CreateMutexW
DeactivateActCtx
GetLogicalDriveStringsA
ResetEvent
InterlockedPushEntrySList
CreateMailslotW
WriteConsoleInputW
QueryDosDeviceA
EnumTimeFormatsA
SetFileValidData
FindFirstFileA
FreeEnvironmentStringsA
InterlockedExchangeAdd
GlobalAlloc
GetTickCount
SetLastError
GetPrivateProfileStructA
CopyFileExW
CreateFileA
GetConsoleTitleW
GetCommConfig
GetNumberOfConsoleInputEvents
CompareStringA
CopyFileA
LoadLibraryA
HeapSize
WriteConsoleW
MultiByteToWideChar
GetLastError
WideCharToMultiByte
UnhandledExceptionFilter
SetUnhandledExceptionFilter
DeleteFileA
GetStartupInfoW
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
HeapFree
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
SetFilePointer
EnterCriticalSection
LeaveCriticalSection
CloseHandle
HeapAlloc
Sleep
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
HeapCreate
VirtualFree
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
RaiseException
VirtualAlloc
HeapReAlloc
LCMapStringA
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
RtlUnwind
InitializeCriticalSectionAndSpinCount
WriteConsoleA
GetConsoleOutputCP
user32
GetMenuInfo
gdi32
GetCharWidth32A
GetCharABCWidthsA
GetColorAdjustment
GetTextFaceW
GetBrushOrgEx
winhttp
WinHttpSetOption
Sections
.text Size: 85KB - Virtual size: 84KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 223KB - Virtual size: 39.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 111KB - Virtual size: 111KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ