?messageMap@CReminders@@1UAFX_MSGMAP@@B
Static task
static1
Behavioral task
behavioral1
Sample
08b63fdb56fe28073861d7bd149ce718056aab0fa36591329ade243f501fdfd1.exe
Resource
win7-20220812-en
General
-
Target
08b63fdb56fe28073861d7bd149ce718056aab0fa36591329ade243f501fdfd1
-
Size
381KB
-
MD5
616cf55af72df718fe123763abd07ce0
-
SHA1
6c7012df31af9364b110622f6456684ea25ea36a
-
SHA256
08b63fdb56fe28073861d7bd149ce718056aab0fa36591329ade243f501fdfd1
-
SHA512
d1480fde794e14c09a6a681f1263217acf4f0a82d40eb6c3a0350569697c2a47928012ba88dd6d96281fa0d14de0c60aedde53772422968a4421b8492948a91f
-
SSDEEP
6144:HgtDXTgkcYj/m9Pjj5RlqfvRKFh/TNDu4LfoQnR0LOoYTktnFB8LJORSylh4:HgtDXTgkhbqjVqfvRKzL1u3QnRFTkkw2
Malware Config
Signatures
Files
-
08b63fdb56fe28073861d7bd149ce718056aab0fa36591329ade243f501fdfd1.exe windows x86
8a22403d1f26cbc8dd35259f0f31ce2e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
version
VerQueryValueA
GetFileVersionInfoA
GetFileVersionInfoSizeA
user32
DrawIcon
GetSystemMetrics
GetDesktopWindow
GetSystemMenu
EnableMenuItem
EqualRect
SystemParametersInfoA
LoadIconA
FindWindowA
SetRectEmpty
IsIconic
GetClientRect
GetParent
InvalidateRect
PostMessageA
LoadCursorA
SetCursor
GetWindowRect
SendMessageA
EnableWindow
GetFocus
OffsetRect
DeleteMenu
GetWindow
AppendMenuA
GetKeyState
RedrawWindow
comctl32
ord17
mfc42
ord1775
ord4407
ord5241
ord2385
ord5163
ord6374
ord4353
ord5280
ord3798
ord4837
ord4441
ord2648
ord2055
ord6376
ord3749
ord5065
ord1727
ord5261
ord2446
ord2124
ord5277
ord2982
ord3147
ord3259
ord4465
ord3136
ord3262
ord2985
ord3081
ord2976
ord3830
ord3831
ord3825
ord3079
ord4080
ord4627
ord4425
ord3597
ord795
ord641
ord324
ord3573
ord3626
ord2414
ord1641
ord6055
ord1776
ord5290
ord3402
ord4424
ord3721
ord567
ord6650
ord6591
ord6807
ord6857
ord6823
ord6855
ord6832
ord6859
ord6867
ord6847
ord6839
ord6846
ord6858
ord6815
ord6812
ord6845
ord6856
ord6835
ord4589
ord4588
ord4899
ord4370
ord4892
ord6817
ord5076
ord4340
ord4347
ord4720
ord4889
ord4531
ord4545
ord4543
ord4526
ord4529
ord4524
ord4963
ord4960
ord4108
ord6054
ord3748
ord1725
ord6691
ord4432
ord6514
ord6478
ord2302
ord4234
ord1768
ord6797
ord2116
ord4277
ord858
ord4129
ord6880
ord2764
ord4160
ord6199
ord3874
ord4287
ord4710
ord2860
ord4299
ord5787
ord5875
ord4078
ord4476
ord1168
ord6215
ord3092
ord2864
ord6597
ord6800
ord6241
ord3005
ord2135
ord6453
ord6808
ord5710
ord537
ord6814
ord535
ord2818
ord4083
ord941
ord939
ord4204
ord6663
ord539
ord6699
ord861
ord5281
ord5981
ord4224
ord5260
ord609
ord823
ord2575
ord4396
ord3574
ord2380
ord3619
ord3811
ord1199
ord3337
ord2915
ord2393
ord5583
ord3790
ord2919
ord4274
ord6375
ord4486
ord1576
ord2512
ord5731
ord3922
ord1089
ord5199
ord2396
ord3346
ord5300
ord5302
ord4079
ord5307
ord5714
ord4622
ord3738
ord815
ord561
ord4046
ord2145
ord2144
ord6225
ord5231
ord5247
ord2132
ord4601
ord826
ord2251
ord5214
ord2621
ord5683
ord5572
ord1134
ord4698
ord2725
ord5289
ord2763
ord1816
ord807
ord554
ord1146
ord2086
ord686
ord6146
ord5885
ord5882
ord5883
ord2453
ord2097
ord384
ord6625
ord2863
ord2862
ord755
ord470
ord5655
ord6805
ord2642
ord1669
ord6822
ord6877
ord4202
ord2652
ord2645
ord5681
ord1105
ord5435
ord1683
ord1673
ord2628
ord5980
ord2641
ord4122
ord6214
ord6196
ord4298
ord5948
ord3088
ord3875
ord3872
ord3871
ord6198
ord4286
ord4283
ord3137
ord3796
ord5719
ord6092
ord3524
ord4032
ord6095
ord4035
ord2549
ord2433
ord3353
ord3579
ord726
ord426
ord6449
ord2727
ord6467
ord2730
ord2729
ord6052
ord2514
ord4998
ord4853
ord4376
ord5265
ord2379
ord860
ord296
ord540
ord2614
ord617
ord800
ord3663
ord825
ord3089
ord2554
msvcrt
iswctype
_pctype
_isctype
__mb_cur_max
atol
strcat
_ltoa
strcpy
strtol
_except_handler3
?terminate@@YAXXZ
??1type_info@@UAE@XZ
__dllonexit
_onexit
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
_mbschr
wcscpy
wcslen
_chmod
abs
swprintf
atoi
_mbsicmp
_mbscmp
memset
_mbsnbicmp
toupper
_chdrive
_chdir
_getcwd
strlen
__CxxFrameHandler
_itoa
_setmbcp
kernel32
InterlockedExchange
GetStartupInfoA
GetModuleHandleA
Sleep
GetProcAddress
GetCurrentProcess
FreeLibrary
GetLocaleInfoA
SearchPathA
GetLastError
CreateProcessA
GetVersionExA
RaiseException
lstrcmpiA
CreateFileA
lstrlenA
lstrcpyA
GetModuleFileNameA
LocalFree
LoadLibraryA
LocalAlloc
SetErrorMode
WritePrivateProfileStringA
DeleteFileA
SetFileAttributesA
GetFileAttributesA
MultiByteToWideChar
GetPrivateProfileStringA
GetShortPathNameA
CloseHandle
gdi32
CreateSolidBrush
GetObjectA
CreateFontIndirectA
PatBlt
advapi32
RegCloseKey
RegOpenKeyExA
StartServiceA
RegEnumValueA
RegCreateKeyExA
RegSetValueExA
RegQueryValueExA
OpenSCManagerA
OpenServiceA
CloseServiceHandle
QueryServiceStatus
shell32
ShellExecuteExA
SHGetSpecialFolderPathA
ole32
CoInitialize
CoUninitialize
CoCreateInstance
oleaut32
SysFreeString
SysAllocString
wsock32
WSACleanup
gethostname
WSAStartup
gethostbyname
inet_addr
Exports
Exports
Sections
.text Size: 64KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 288KB - Virtual size: 288KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE