Static task
static1
Behavioral task
behavioral1
Sample
9545504780c309e3f14dda5d20849fe83b717ad7a28025fa4a4a9c1225d195bb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
9545504780c309e3f14dda5d20849fe83b717ad7a28025fa4a4a9c1225d195bb.exe
Resource
win10v2004-20220812-en
General
-
Target
9545504780c309e3f14dda5d20849fe83b717ad7a28025fa4a4a9c1225d195bb
-
Size
364KB
-
MD5
65a2d946250b87d24258484be30aa34d
-
SHA1
013069f9634e6724779b5a8cb09756ac0f940a25
-
SHA256
9545504780c309e3f14dda5d20849fe83b717ad7a28025fa4a4a9c1225d195bb
-
SHA512
83f80af93b8c83840e59fe3a2f38f4432bf8b6a24324e8cdf1080cc9342d0374c24209f89a472459b788f47cf895f40c4769b471dabfebf187c3776653760a31
-
SSDEEP
6144:o0KCJyiHB+nqr0FpIlsUuDnhqK1xOuSSluv7t69YsURI2FBOEwv2:vd90FpIGUwwUxmTt0HN2FBOEwv2
Malware Config
Signatures
Files
-
9545504780c309e3f14dda5d20849fe83b717ad7a28025fa4a4a9c1225d195bb.exe windows x86
f7ccf4f7cc5b778c8262faf213af7c3e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
comdlg32
GetSaveFileNameW
GetOpenFileNameW
advapi32
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
RegSetValueExW
RegCreateKeyExW
RegDeleteValueW
comctl32
InitCommonControlsEx
kernel32
ReadFile
GetProcessHeap
SetEndOfFile
SetEnvironmentVariableA
CompareStringW
CompareStringA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
CreateFileA
FlushFileBuffers
InitializeCriticalSectionAndSpinCount
LoadLibraryA
GetConsoleMode
GetConsoleCP
SetFilePointer
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
SetStdHandle
GetFileAttributesA
CloseHandle
HeapReAlloc
VirtualAlloc
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
VirtualFree
HeapCreate
DeleteCriticalSection
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
RaiseException
HeapAlloc
ExitProcess
HeapSize
Sleep
GetModuleFileNameA
GetStdHandle
WriteFile
LCMapStringW
LCMapStringA
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
InterlockedDecrement
GetCurrentThreadId
SetLastError
InterlockedIncrement
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
LeaveCriticalSection
EnterCriticalSection
HeapFree
DeleteFileA
MoveFileA
GetLastError
GetStartupInfoA
GetCommandLineA
RtlUnwind
MultiByteToWideChar
GetVersionExW
FreeLibrary
LoadLibraryW
GlobalSize
GlobalLock
GlobalAlloc
GlobalUnlock
GlobalReAlloc
GlobalFree
MulDiv
WideCharToMultiByte
GetModuleHandleW
GetProcAddress
GetModuleFileNameW
user32
DestroyCursor
SendMessageW
SendDlgItemMessageW
EndDialog
CreateDialogParamW
DialogBoxParamW
CreateWindowExW
SetMenuDefaultItem
CheckMenuItem
GetClipboardOwner
OpenClipboard
CloseClipboard
RegisterClipboardFormatW
IsClipboardFormatAvailable
GetClipboardData
EmptyClipboard
SetClipboardData
TrackPopupMenu
LoadMenuW
LoadBitmapW
GetMenuItemInfoW
GetMenuItemCount
GetMenuItemID
GetMenuState
GetSubMenu
GetMenuStringW
ModifyMenuW
GetSystemMetrics
DestroyMenu
SetWindowsHookExW
LoadIconW
MessageBoxA
FindWindowW
BringWindowToTop
MessageBeep
GetMessageW
IsWindow
IsDialogMessageW
TranslateMessage
DispatchMessageW
UnhookWindowsHookEx
RegisterClassExW
RegisterWindowMessageW
GetCursorPos
SetForegroundWindow
PostMessageW
GetMenuDefaultItem
PostQuitMessage
UpdateWindow
SetCursor
GetSysColor
SetFocus
MessageBoxW
GetFocus
GetDlgCtrlID
DestroyWindow
GetSystemMenu
LoadStringW
AppendMenuW
EnableWindow
GetDesktopWindow
GetWindowRect
IntersectRect
IsWindowVisible
ScreenToClient
SetWindowPos
ShowWindow
SetWindowTextW
InflateRect
DrawFrameControl
GetWindowTextW
DrawStateW
DrawFocusRect
GetClientRect
DestroyIcon
InvalidateRect
CallWindowProcW
SetWindowLongW
DefWindowProcW
GetWindowLongW
GetDC
GetTopWindow
GetWindow
ReleaseDC
GetDlgItem
LoadImageW
gdi32
GetDeviceCaps
SetBkColor
ExtTextOutW
CreateCompatibleDC
BitBlt
DeleteDC
SetBkMode
CreateSolidBrush
GetObjectW
CreateFontIndirectW
EnumFontFamiliesExW
SelectObject
Rectangle
GetTextExtentPoint32W
SetTextColor
GetStockObject
DeleteObject
shell32
ShellExecuteW
ukhook40
VnConvert
?ModifyStatusIcon@@YAXXZ
?UkLoadKeyOrderMap@@YAHPBDPAUUkKeyMapPair@@PAH@Z
?UkStoreKeyOrderMap@@YAHPBDPAUUkKeyMapPair@@H@Z
?MsViMethodMapping@@3PAUUkKeyMapping@@A
?VIQRMethodMapping@@3PAUUkKeyMapping@@A
?VniMethodMapping@@3PAUUkKeyMapping@@A
?SimpleTelexMethodMapping@@3PAUUkKeyMapping@@A
?TelexMethodMapping@@3PAUUkKeyMapping@@A
?getText@CMacroTable@@QAEPBIH@Z
?getKey@CMacroTable@@QAEPBIH@Z
?getCount@CMacroTable@@QAEHXZ
?writeToFile@CMacroTable@@QAEHPBD@Z
?addItem@CMacroTable@@QAEHPBX0H@Z
?resetContent@CMacroTable@@QAEXXZ
?SetUnikeyOptions@@YAXPAU_UnikeyOptions@@H@Z
?SetOutputCharset@@YAHH@Z
?loadFromFile@CMacroTable@@QAEHPBD@Z
?init@CMacroTable@@QAEXXZ
?RecreateStatusIcon@@YAXXZ
?DeleteStatusIcon@@YAXXZ
?IsVietnamese@@YAHXZ
?SwitchMode@@YAXXZ
?GetVietHookDll@@YAPAUHINSTANCE__@@XZ
?SetUnikeyReady@@YAXXZ
?SetInputMethod@@YAHW4UkInputMethod@@@Z
?EnableUnikey@@YAXH@Z
?SetUnikeySysInfo@@YAXPAU_UnikeySysInfo@@@Z
?InitUkHook@@YAXXZ
?MyMouseHook@@YGJHIJ@Z
?MyKeyHook@@YGJHIJ@Z
?SetSwitchKey@@YAXH@Z
?UnikeyLoadMacro@@YAXPBD@Z
?UnikeyLoadUserKeyMap@@YAHPBD@Z
VnFileConvert
?VnConvSetOptions@@YAXPAU_VnConvOptions@@@Z
?VnConvResetOptions@@YAXPAU_VnConvOptions@@@Z
?VnConvGetOptions@@YAXPAU_VnConvOptions@@@Z
?genConvert@@YAHAAVVnCharset@@0AAVByteInStream@@AAVByteOutStream@@@Z
?getVnCharset@CVnCharsetLib@@QAEPAVVnCharset@@H@Z
?VnCharsetLibObj@@3VCVnCharsetLib@@A
Sections
.text Size: 142KB - Virtual size: 141KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 18KB - Virtual size: 199KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 108KB - Virtual size: 112KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE