Static task
static1
General
-
Target
777cd082c4d3d6a8fb293aedf3dc1a0102b4157d5146801123fb0ef1e29f029a
-
Size
458KB
-
MD5
2e390bad698036f03f5e2cc4bc4b3c72
-
SHA1
337e74bdc4f6894a0440e56678deb7327144e2e7
-
SHA256
777cd082c4d3d6a8fb293aedf3dc1a0102b4157d5146801123fb0ef1e29f029a
-
SHA512
fa905f7c0e1641d8644d7ea12c856cf9d0807bd7901fdcae6d3fbd2597f56d1487746f185a8f8f4f3d2ebb9592f56c9d006be1ef9ed7f7d6a839caa118ed5a1c
-
SSDEEP
6144:zFhu1to7ZcDBpiFMVPxfloP6yZtDx+KVVXWYRDSc3jprNiAU2mI:z8G7ZmBpzxOSyTDwKVoYxBJNiAU2m
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 777cd082c4d3d6a8fb293aedf3dc1a0102b4157d5146801123fb0ef1e29f029a
Files
-
777cd082c4d3d6a8fb293aedf3dc1a0102b4157d5146801123fb0ef1e29f029a.exe windows x86
4a60f94d678887610d46dafb1219713a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommandLineW
GetFileSize
GetConsoleAliasExesA
GetDriveTypeW
GetConsoleAliasExesLengthA
BuildCommDCBAndTimeoutsA
InterlockedIncrement
MoveFileExW
GetConsoleAliasA
InterlockedDecrement
WaitNamedPipeA
GetCurrentProcess
GetNamedPipeHandleStateA
SetHandleInformation
GetProfileStringW
GetUserDefaultLCID
SetComputerNameW
GetComputerNameW
FlushConsoleInputBuffer
FreeEnvironmentStringsA
_lclose
_lcreat
GetModuleHandleW
GetConsoleAliasesLengthA
GetNumberFormatA
GetWindowsDirectoryA
EnumTimeFormatsW
GetUserDefaultLangID
GetCommandLineA
GlobalAlloc
GetPrivateProfileIntA
GetSystemDirectoryW
SetFileShortNameW
LoadLibraryW
ReadConsoleInputA
_hread
GetPrivateProfileStructW
GetCalendarInfoW
SetConsoleCP
DeleteVolumeMountPointW
TransactNamedPipe
GetTimeFormatW
ExitThread
CreateMailslotW
EnumSystemLocalesA
SetCurrentDirectoryA
GetStartupInfoA
GetLastError
IsDBCSLeadByteEx
SetLastError
GetProcAddress
BackupWrite
MoveFileW
GlobalFree
LoadLibraryA
OpenWaitableTimerW
SetConsoleCtrlHandler
GlobalGetAtomNameW
FindNextFileA
CreateIoCompletionPort
_lread
GetModuleHandleA
OpenFileMappingW
GetProcessAffinityMask
FindNextFileW
VirtualProtect
GetCurrentDirectoryA
EnumDateFormatsW
GetConsoleCursorInfo
PeekConsoleInputA
OpenSemaphoreW
FindFirstVolumeA
TerminateJobObject
LocalSize
GetVolumeNameForVolumeMountPointW
DeleteFileW
DebugBreak
ReadConsoleOutputCharacterW
DeleteFileA
CloseHandle
ReadFile
WriteConsoleW
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
EncodePointer
DecodePointer
HeapFree
HeapAlloc
ExitProcess
HeapSetInformation
GetStartupInfoW
RtlUnwind
HeapCreate
WriteFile
GetStdHandle
GetModuleFileNameW
SetFilePointer
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
RaiseException
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
HeapSize
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetStringTypeW
MultiByteToWideChar
IsProcessorFeaturePresent
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
HeapReAlloc
LCMapStringW
CreateFileW
user32
CharUpperBuffA
CharUpperA
Sections
.text Size: 155KB - Virtual size: 154KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 239KB - Virtual size: 30.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 63KB - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ