?GetStrImage@@YAXPAEHPAY1BFBI@DA@E@Z
Overview
overview
4Static
static
apsL3150ql...er.exe
windows7-x64
1apsL3150ql...er.exe
windows10-2004-x64
1apsL3150ql...ne.dll
windows7-x64
1apsL3150ql...ne.dll
windows10-2004-x64
3apsL3150ql...rv.dll
windows7-x64
1apsL3150ql...rv.dll
windows10-2004-x64
1apsL3150ql...��.doc
windows7-x64
4apsL3150ql...��.doc
windows10-2004-x64
1Static task
static1
Behavioral task
behavioral1
Sample
apsL3150qlcrj/L3150L3151L3153L3156L3157L3158ð ͼ/Resetter.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
apsL3150qlcrj/L3150L3151L3153L3156L3157L3158ð ͼ/Resetter.exe
Resource
win10v2004-20220812-en
Behavioral task
behavioral3
Sample
apsL3150qlcrj/L3150L3151L3153L3156L3157L3158ð ͼ/StrGene.dll
Resource
win7-20220812-en
Behavioral task
behavioral4
Sample
apsL3150qlcrj/L3150L3151L3153L3156L3157L3158ð ͼ/StrGene.dll
Resource
win10v2004-20220901-en
Behavioral task
behavioral5
Sample
apsL3150qlcrj/L3150L3151L3153L3156L3157L3158ð ͼ/apdadrv.dll
Resource
win7-20220812-en
Behavioral task
behavioral6
Sample
apsL3150qlcrj/L3150L3151L3153L3156L3157L3158ð ͼ/apdadrv.dll
Resource
win10v2004-20220812-en
Behavioral task
behavioral7
Sample
apsL3150qlcrj/L3150L3151L3153L3156L3157L3158ð ͼ/ͼ.doc
Resource
win7-20220812-en
Behavioral task
behavioral8
Sample
apsL3150qlcrj/L3150L3151L3153L3156L3157L3158ð ͼ/ͼ.doc
Resource
win10v2004-20220901-en
General
-
Target
c60bc5d7f92bdfde140eaedf8f028ea195655cb24d7d96b3862075594b87789d
-
Size
1.4MB
-
MD5
4508471cb6405f1b40dd836aaf419035
-
SHA1
e315a79909f7b4fcaa4aac7a710d7aa32bcc44cd
-
SHA256
c60bc5d7f92bdfde140eaedf8f028ea195655cb24d7d96b3862075594b87789d
-
SHA512
706786512ec174b99a94fe35dc9a13e1fa3cbade411e177b3e5cde2b3d6d55cfdd6c789297f71f58ee5d31bc1820c6b80eb3260c2ca94afea2561e6c93b682a8
-
SSDEEP
24576:NXvtqHNRnv2gh7c0UgfrM63vXdyH86bxu+C6zjEcRu3DaT0wa:NVqHNRNcNgfrTXIHxxN/ATaYwa
Malware Config
Signatures
Files
-
c60bc5d7f92bdfde140eaedf8f028ea195655cb24d7d96b3862075594b87789d.zip
-
apsL3150qlcrj/L3150L3151L3153L3156L3157L3158ð ͼ/Resetter.exe.exe windows x86
5c14cfd970fd80a21a11c90b62dd5711
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
apdadrv
?ADD4Termination@CApdadrv@@QAEKXZ
?ioctl@CApdadrv@@QAEPAXW4apdadrvIoctl_t@@PAX@Z
?ADGetDeviceID@CApdadrv@@QAEKPAEK@Z
?ADD4Negotiation@CApdadrv@@QAEKXZ
?ADD4ReceiveDataFromDataCh@CApdadrv@@QAEKPAEKAAK@Z
?ADD4SendAndReceiveCtrlCh@CApdadrv@@QAEKPAEK0KAAK@Z
?ADPortClose@CApdadrv@@QAEHXZ
?ADPortOpen@CApdadrv@@QAEKPBD@Z
??0CApdadrv@@QAE@XZ
?ADD4SendDataToDataCh@CApdadrv@@QAEKPAEKAAK@Z
??1CApdadrv@@QAE@XZ
?ADSetRWTimeOut@CApdadrv@@QAEXU_COMMTIMEOUTS@@@Z
strgene
?GetStrImage@@YAXPAEHPAY1BFBI@DA@E@Z
kernel32
GetCurrentProcess
GetVolumeInformationA
GetFullPathNameA
GetCurrentDirectoryA
GlobalFlags
LocalAlloc
LeaveCriticalSection
TlsGetValue
EnterCriticalSection
GlobalReAlloc
GlobalHandle
InitializeCriticalSection
TlsAlloc
TlsSetValue
LocalReAlloc
DeleteCriticalSection
TlsFree
InterlockedIncrement
GetCPInfo
GetOEMCP
FileTimeToSystemTime
FindResourceExA
SetErrorMode
FileTimeToLocalFileTime
GetFileTime
RtlUnwind
GetSystemTimeAsFileTime
GetDriveTypeA
GetTimeFormatA
DuplicateHandle
GetFileInformationByHandle
PeekNamedPipe
GetFileType
RaiseException
ExitProcess
VirtualAlloc
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
GetStartupInfoA
ExitThread
CreateThread
HeapSize
HeapDestroy
HeapCreate
VirtualFree
GetStdHandle
GetACP
IsValidCodePage
GetTimeZoneInformation
GetConsoleCP
GetConsoleMode
SetStdHandle
SetHandleCount
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetThreadLocale
VirtualProtect
GetModuleFileNameW
FormatMessageA
LocalFree
GlobalGetAtomNameA
GlobalFindAtomA
lstrcmpW
MulDiv
GlobalUnlock
FreeResource
GetCurrentProcessId
SetLastError
GlobalAddAtomA
SuspendThread
SetEvent
SetThreadPriority
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
LoadLibraryA
GlobalLock
lstrcmpA
FreeLibrary
GetModuleHandleA
GetProcAddress
CompareStringA
CompareStringW
InterlockedExchange
GetVersion
CreateEventA
WaitForSingleObject
WritePrivateProfileStringA
GlobalAlloc
GlobalFree
SetCurrentDirectoryA
WinExec
SetFileAttributesA
FindFirstFileA
MoveFileA
FindNextFileA
FindClose
RemoveDirectoryA
CreateDirectoryA
GetFileAttributesA
DeleteFileA
CreateMutexW
GetVersionExA
CreateFileA
DeviceIoControl
GetLastError
CloseHandle
MultiByteToWideChar
InterlockedDecrement
HeapReAlloc
HeapFree
GetProcessHeap
HeapAlloc
lstrlenA
ResumeThread
GetExitCodeThread
Sleep
WideCharToMultiByte
LoadResource
LockResource
SizeofResource
FindResourceA
GetWindowsDirectoryA
GetModuleFileNameA
GetPrivateProfileIntA
GetPrivateProfileStringA
GetDateFormatA
user32
MapDialogRect
GetSysColorBrush
UnregisterClassA
GetDlgItemTextA
RegisterWindowMessageA
SendDlgItemMessageA
GetCapture
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
ScrollWindow
GetScrollRange
GetScrollPos
SetForegroundWindow
GetMenu
GetSubMenu
GetMenuItemID
GetMenuItemCount
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
SetScrollInfo
PtInRect
SetWindowPlacement
DefWindowProcA
CallWindowProcA
GetAsyncKeyState
SetWindowPos
SystemParametersInfoA
GetWindowPlacement
GetWindow
GetSysColor
ClientToScreen
ScreenToClient
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
GetDesktopWindow
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetDlgItem
GetNextDlgTabItem
EndDialog
GetWindowThreadProcessId
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
SetCursor
SetWindowsHookExA
CallNextHookEx
GetMessageA
GetActiveWindow
GetKeyState
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
PostQuitMessage
CharUpperA
KillTimer
SetTimer
PeekMessageA
TranslateMessage
DispatchMessageA
wsprintfA
IsWindowVisible
UpdateWindow
LoadCursorA
CopyIcon
InvalidateRect
GetDC
GetDlgCtrlID
BeginPaint
DestroyMenu
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
EndPaint
ReleaseDC
PostMessageA
LoadIconA
GetClientRect
IsIconic
GetSystemMenu
AppendMenuA
DrawIcon
EnableWindow
RedrawWindow
GetWindowRect
GetSystemMetrics
SetDlgItemTextA
GetParent
SendMessageA
WinHelpA
MessageBoxA
SetSystemCursor
SetWindowLongA
gdi32
RectVisible
TextOutA
ExtTextOutA
Escape
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
GetStockObject
EnumFontFamiliesExA
GetObjectA
SetBkMode
SetBkColor
RestoreDC
SaveDC
CreateBitmap
CreateCompatibleDC
CreateDIBitmap
SelectObject
SetStretchBltMode
StretchBlt
DeleteObject
CreateFontA
GetDeviceCaps
CreateSolidBrush
GetClipBox
SetMapMode
SetTextColor
PtVisible
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
ClosePrinter
EnumPortsA
OpenPrinterA
advapi32
RegQueryValueA
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
RegSetValueExA
RegCreateKeyExA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
shell32
ShellExecuteA
shlwapi
PathFindFileNameA
PathStripToRootA
PathIsUNCA
PathFindExtensionA
ole32
CoUninitialize
CoInitializeEx
CoCreateInstance
CoSetProxyBlanket
CoInitializeSecurity
oleaut32
SysAllocString
VariantInit
VariantChangeType
SafeArrayGetDim
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayAccessData
SafeArrayUnaccessData
SysStringLen
SysAllocStringLen
VariantClear
SysFreeString
Sections
.text Size: 2.3MB - Virtual size: 2.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 508KB - Virtual size: 507KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 212KB - Virtual size: 9.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 144KB - Virtual size: 140KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
apsL3150qlcrj/L3150L3151L3153L3156L3157L3158ð ͼ/StrGene.dll.dll windows x86
b3631fd0db5e1b44a196a10aff91db7a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
InterlockedFlushSList
RtlUnwind
GetLastError
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetModuleFileNameA
MultiByteToWideChar
WideCharToMultiByte
HeapFree
HeapAlloc
LCMapStringW
FindClose
FindFirstFileExA
FindNextFileA
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetProcessHeap
GetStdHandle
GetFileType
GetStringTypeW
HeapSize
HeapReAlloc
SetStdHandle
WriteFile
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetFilePointerEx
CloseHandle
WriteConsoleW
DecodePointer
CreateFileW
RaiseException
Exports
Exports
Sections
.text Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 160B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
apsL3150qlcrj/L3150L3151L3153L3156L3157L3158ð ͼ/apdadrv.dll.dll windows x86
ba8adf378bc7b6d478eed516f8c18d0c
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
setupapi
SetupDiOpenDeviceInterfaceRegKey
SetupDiGetClassDevsA
SetupDiEnumDeviceInterfaces
SetupDiGetDeviceInterfaceDetailA
SetupDiOpenDevRegKey
SetupDiDestroyDeviceInfoList
kernel32
FlushFileBuffers
WriteConsoleW
GetConsoleOutputCP
CreateFileA
DefineDosDeviceA
QueryDosDeviceA
lstrcmpiA
CloseHandle
WriteFile
ClearCommError
Sleep
ReadFile
DeviceIoControl
SetCommTimeouts
GetVersionExA
lstrlenA
SetUnhandledExceptionFilter
GetProcAddress
GetModuleHandleA
ExitProcess
RtlUnwind
GetCurrentThreadId
GetCommandLineA
HeapFree
HeapAlloc
GetProcessHeap
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetLastError
InterlockedDecrement
HeapSize
GetStdHandle
GetModuleFileNameA
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
LoadLibraryA
InitializeCriticalSection
RaiseException
SetHandleCount
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapReAlloc
VirtualAlloc
MultiByteToWideChar
GetLocaleInfoA
SetFilePointer
GetConsoleCP
GetConsoleMode
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
SetStdHandle
WriteConsoleA
advapi32
RegCloseKey
RegQueryValueExA
Exports
Exports
??0CApdadrv@@QAE@XZ
??1CApdadrv@@QAE@XZ
??4CApdadrv@@QAEAAV0@ABV0@@Z
?ADD4CloseCtrlChannel@CApdadrv@@QAEKXZ
?ADD4CloseDataChannel@CApdadrv@@QAEKXZ
?ADD4Negotiation@CApdadrv@@QAEKXZ
?ADD4ReceiveDataFromDataCh@CApdadrv@@QAEKPAEKAAK@Z
?ADD4SendAndReceiveCtrlCh@CApdadrv@@QAEKPAEK0KAAK@Z
?ADD4SendDataToDataCh@CApdadrv@@QAEKPAEKAAK@Z
?ADD4SetCommPacketSize@CApdadrv@@QAEXGGGG@Z
?ADD4Termination@CApdadrv@@QAEKXZ
?ADD4Termination_v@CApdadrv@@QAEKXZ
?ADGetDeviceID@CApdadrv@@QAEKPAEK@Z
?ADInitDevice@CApdadrv@@QAEKXZ
?ADPortClose@CApdadrv@@QAEHXZ
?ADPortOpen@CApdadrv@@QAEKPBD@Z
?ADReceive@CApdadrv@@QAEKPAEKAAK@Z
?ADSend@CApdadrv@@QAEKPAEKAAK@Z
?ADSetRWTimeOut@CApdadrv@@QAEXU_COMMTIMEOUTS@@@Z
?ADSetReceiveType@CApdadrv@@QAEXK@Z
?ioctl@CApdadrv@@QAEPAXW4apdadrvIoctl_t@@PAX@Z
Sections
.text Size: 60KB - Virtual size: 57KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 176B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
-
apsL3150qlcrj/L3150L3151L3153L3156L3157L3158ð ͼ/ͼ.doc.doc windows office2003