?LowLevelMouseProc@@YGJHIJ@Z
Static task
static1
Behavioral task
behavioral1
Sample
bdd7eb80714d5ebcbb80f5bbea205e31035f0b82528249fc2be1f34756fe6950.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
bdd7eb80714d5ebcbb80f5bbea205e31035f0b82528249fc2be1f34756fe6950.exe
Resource
win10v2004-20220812-en
General
-
Target
bdd7eb80714d5ebcbb80f5bbea205e31035f0b82528249fc2be1f34756fe6950
-
Size
240KB
-
MD5
0d6ec3e82fa9ae6e77bf200f0c12a8a8
-
SHA1
9847ee40240decf2873ec2b6a8bb44944ba65342
-
SHA256
bdd7eb80714d5ebcbb80f5bbea205e31035f0b82528249fc2be1f34756fe6950
-
SHA512
d392711fd2d7fbfddd9f72f0164f237b3c3b380ac2d7e5c43b460fb45ce567253405d972895788e02946269160d3168b8fef2556c11aa0620b683dd449ea1a39
-
SSDEEP
6144:OIIrdSqfRtb+8FEl9NF3bxUn9mtslTCxn1+Vn:nIwqfRtbNEl9NFLS9+slux
Malware Config
Signatures
Files
-
bdd7eb80714d5ebcbb80f5bbea205e31035f0b82528249fc2be1f34756fe6950.exe windows x86
cf61a157c4ef99765fc6d618bcb0de4e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
GetLastError
CreateMutexA
ExitProcess
SetThreadPriority
CreateDirectoryA
ExitThread
GetComputerNameA
CreateProcessA
lstrcmpiA
GetFileAttributesA
GetFullPathNameA
GetSystemDirectoryA
GetProcAddress
GetModuleHandleA
SetPriorityClass
GetCurrentProcess
GetCurrentDirectoryA
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
lstrcpynA
lstrcmpA
CopyFileA
lstrcpyA
lstrcatA
FindFirstFileA
FindNextFileA
FindClose
WaitForSingleObject
SetFileAttributesA
CreateThread
GetLocaleInfoW
GetOEMCP
GetACP
IsBadCodePtr
CreateFileA
SetFilePointer
Sleep
CloseHandle
WriteFile
lstrlenA
GetModuleFileNameA
IsBadReadPtr
GetStringTypeW
GetStringTypeA
GetVersionExA
GetUserDefaultLCID
EnumSystemLocalesA
GetLocaleInfoA
IsValidCodePage
IsValidLocale
DeleteFileA
LocalAlloc
GlobalFree
GlobalReAlloc
GlobalAlloc
WideCharToMultiByte
MultiByteToWideChar
RtlUnwind
RaiseException
HeapFree
GetFileType
TerminateProcess
GetTimeZoneInformation
GetSystemTime
GetLocalTime
SetEnvironmentVariableA
SetCurrentDirectoryA
GetStartupInfoA
GetCommandLineA
GetVersion
GetSystemTimeAsFileTime
HeapAlloc
HeapReAlloc
LCMapStringA
LCMapStringW
GetCPInfo
CompareStringA
CompareStringW
HeapSize
SetUnhandledExceptionFilter
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
SetStdHandle
SetHandleCount
GetStdHandle
SetEndOfFile
ReadFile
FlushFileBuffers
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
user32
GetDC
GetKeyboardState
GetKeyNameTextA
wsprintfA
GetWindowTextA
GetActiveWindow
CallNextHookEx
UnhookWindowsHookEx
DispatchMessageA
TranslateMessage
FindWindowA
CharLowerA
SetWindowsHookExA
ReleaseDC
SetKeyboardState
GetCursorPos
PeekMessageA
GetMessageA
ToAscii
advapi32
RegDeleteValueA
RegCreateKeyA
RegQueryValueExA
RegOpenKeyA
RegSetValueExA
RegCloseKey
wininet
InternetCloseHandle
InternetReadFile
InternetOpenUrlA
InternetOpenA
FtpCreateDirectoryA
InternetConnectA
FtpPutFileA
FtpGetCurrentDirectoryA
FtpSetCurrentDirectoryA
gdi32
GetObjectA
GetDIBits
RealizePalette
SelectPalette
GetStockObject
SetPixel
BitBlt
SelectObject
CreateDIBSection
DeleteDC
CreateCompatibleDC
CreateDCA
Exports
Exports
Sections
.text Size: 172KB - Virtual size: 171KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ