Static task
static1
General
-
Target
CustomFlow hackvshack.net.zip
-
Size
1.5MB
-
MD5
a1c77a426752f85e724daf7eba9122a0
-
SHA1
41506c7f22d05c50210e62d19e25f510ed3a171a
-
SHA256
1f1fae367d17a61129eb69cf8fba4c1224a109045637b7c6f48086430efe9a09
-
SHA512
03cefbf9adc20118813f522700d01d148f0100fdd66456d4be533a780e6791cd6193db87c24c5427bd5db6e6a0cf131a042da086ec376564b52b527a56af293b
-
SSDEEP
24576:Pj/FPfFBf1Uh7viA0ZdEKEVbUD86O/5hvDLBhCsC53NQHdRdu+a2TVXO:PXUh7p0ZdEKEVbQQ5pI+vdDa8XO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/CustomFlow (11) hackvshack.net (1).dll
Files
-
CustomFlow hackvshack.net.zip.zip
Password: hvh.net
-
CustomFlow (11) hackvshack.net (1).dll.dll windows:6 windows x86 arch:x86
Password: hvh.net
61d742c3d3304d9de5870bb98539f24f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
Imports
kernel32
MultiByteToWideChar
VirtualProtect
GetModuleFileNameA
GlobalAlloc
GlobalFree
GlobalLock
GlobalUnlock
LoadLibraryW
QueryPerformanceFrequency
QueryPerformanceCounter
GetFileAttributesA
CreateDirectoryA
lstrcpyA
GetEnvironmentVariableA
FindFirstFileA
FindNextFileA
GetFullPathNameA
FindClose
WideCharToMultiByte
GetCurrentProcess
ReadProcessMemory
WriteProcessMemory
SetEndOfFile
WriteConsoleW
GetModuleFileNameW
GetProcessHeap
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
HeapSize
HeapReAlloc
GetTimeZoneInformation
DeleteFileW
ReadConsoleW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
lstrlenW
WaitNamedPipeW
GetCurrentProcessId
CloseHandle
GetLastError
CreateFileW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
HeapFree
GetConsoleMode
PeekNamedPipe
WriteFile
SetStdHandle
ReadFile
InitializeConditionVariable
WakeConditionVariable
WakeAllConditionVariable
SleepConditionVariableSRW
FormatMessageA
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
TryAcquireSRWLockExclusive
GetCurrentThreadId
WaitForSingleObjectEx
Sleep
GetExitCodeThread
LocalFree
GetLocaleInfoEx
FindFirstFileW
FindFirstFileExW
FindNextFileW
GetFileAttributesExW
AreFileApisANSI
GetModuleHandleW
GetProcAddress
GetFileInformationByHandleEx
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
EncodePointer
DecodePointer
LCMapStringEx
GetSystemTimeAsFileTime
GetStringTypeW
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
InitializeSListHead
RtlUnwind
InterlockedFlushSList
RaiseException
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
CreateThread
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
ExitProcess
GetFileSizeEx
SetFilePointerEx
GetStdHandle
GetFileType
HeapAlloc
FlushFileBuffers
GetConsoleOutputCP
user32
CallWindowProcA
SetClipboardData
GetAsyncKeyState
GetKeyState
LoadCursorA
ScreenToClient
GetCapture
ClientToScreen
IsChild
GetForegroundWindow
SetCapture
SetCursor
GetClientRect
ReleaseCapture
SetCursorPos
GetCursorPos
OpenClipboard
CloseClipboard
EmptyClipboard
GetClipboardData
advapi32
RegCloseKey
RegSetValueExW
RegCreateKeyExW
shell32
ShellExecuteA
d3dx9_43
D3DXCreateTextureFromFileInMemory
winmm
PlaySoundA
imm32
ImmReleaseContext
ImmGetContext
ImmSetCompositionWindow
Sections
.text Size: 2.2MB - Virtual size: 2.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 625KB - Virtual size: 624KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 626KB - Virtual size: 13.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
_RDATA Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 248B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 105KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ