Static task
static1
Behavioral task
behavioral1
Sample
a54d3351796e7472b8236d50f51da64ad8f1c7dc3b8c1231722cb8b5a867ce33.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a54d3351796e7472b8236d50f51da64ad8f1c7dc3b8c1231722cb8b5a867ce33.exe
Resource
win10v2004-20220812-en
General
-
Target
a54d3351796e7472b8236d50f51da64ad8f1c7dc3b8c1231722cb8b5a867ce33
-
Size
745KB
-
MD5
778903732b7311ed4d87d41d9d215010
-
SHA1
ba1f633f376f0393db638149a7aabef3eee6dbbb
-
SHA256
a54d3351796e7472b8236d50f51da64ad8f1c7dc3b8c1231722cb8b5a867ce33
-
SHA512
a3591dec62bd60d1d8f099c757dc05682f8ed8df1c36c628bbd020dce2cd25484d1d9c3b5ef696ad1acb0e23c52bd052caa1460328b40aec27227c9f012684fe
-
SSDEEP
6144:KzGAvR9F3gTO221gY1g39ybulNMDaxcmmdr:cNQx39OsNxcLdr
Malware Config
Signatures
Files
-
a54d3351796e7472b8236d50f51da64ad8f1c7dc3b8c1231722cb8b5a867ce33.exe windows x86
ea54502169fb93678acd95350e7dd8d8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
wkwbl90
?WzStrStrEx@MWblStrings@@SAPA_WPB_WI0IW4EStringCompareType@@@Z
?CwchFromWz@MWblStrings@@SAHPB_W@Z
?_WksHeapDestroy@@YAPAXPAX@Z
?CwchSzToWz@MWblStrings@@SAHPBDPA_WH@Z
?CchFromSz@MWblStrings@@SAHPBD@Z
?_WksHeapAlloc@@YAPAXPAXKK@Z
?Init@CWblMessages@@QAEXPAUHINSTANCE__@@@Z
?_WksHeapCreate@@YAPAXKKK@Z
?LoadUIResourceDLL@MWblIntl@@SAPAUHINSTANCE__@@PB_WPAU2@@Z
?CwchLoadWz@MWblIntl@@SAHPAUHINSTANCE__@@IPA_WH@Z
??0CWblMessages@@QAE@XZ
??2@YAPAXIPAXK@Z
?OperatorDelete@@YAXPAX@Z
?FailureMemory@CWblMessages@@QAEXPAUHWND__@@@Z
WksSqmOnBroadcast
WksSqmEnd
?FailureReinstall@CWblMessages@@QAEXPAUHWND__@@PB_W@Z
WksSqmBegin
WksSqmRegWinMsg
wkwat90
?HrInitWksGen@@YAJK@Z
?DryOff@@YAXXZ
?Splash@@YAHIPB_WPAUHICON__@@1_N@Z
?WksBFirstRunEula@@YA_NXZ
?CleanUpWksGen@@YAXXZ
?kPM_SPARKCOMMAND@@3IA
?kPM_GETADMANAGER@@3IA
?WksSetUnhandledExceptionFilter@@YAXXZ
kernel32
MultiByteToWideChar
SetEvent
InitializeCriticalSection
FreeLibrary
lstrcmpiW
SizeofResource
LoadResource
FindResourceW
LoadLibraryExW
InterlockedDecrement
InterlockedIncrement
GetModuleHandleW
GetCurrentThreadId
DeleteCriticalSection
lstrcpynA
lstrcpynW
lstrlenW
GetVersionExW
CloseHandle
GetCurrentProcess
GetVersionExA
LeaveCriticalSection
GetModuleFileNameW
lstrcmpW
MulDiv
GlobalUnlock
GlobalLock
GlobalAlloc
GetVersion
SetLastError
EnterCriticalSection
CreateSemaphoreW
GetLastError
Sleep
RaiseException
IsValidCodePage
WideCharToMultiByte
IsValidLocale
GetUserDefaultLCID
GetACP
GetCommandLineW
HeapFree
GetProcessHeap
HeapAlloc
InterlockedCompareExchange
GetProcAddress
LoadLibraryA
IsProcessorFeaturePresent
VirtualFree
VirtualAlloc
InterlockedExchange
GetLocaleInfoA
GetThreadLocale
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
FlushInstructionCache
user32
RegisterWindowMessageA
CreateWindowExW
MessageBoxW
DeleteMenu
SetRect
IsMenu
GetSysColor
BeginPaint
FillRect
EndPaint
GetDC
ReleaseDC
IsChild
GetDlgItem
RedrawWindow
DestroyWindow
GetClassNameW
CharNextW
CreateAcceleratorTableW
ClientToScreen
GetParent
SetCapture
ReleaseCapture
InvalidateRect
InvalidateRgn
SetWindowLongW
GetClassInfoExW
LoadCursorW
RegisterClassExW
ShowWindow
CallWindowProcW
LoadAcceleratorsW
LoadMenuW
GetMessageW
TranslateMessage
DispatchMessageW
wsprintfW
LoadImageW
DefWindowProcW
GetMenuItemInfoW
RemoveMenu
GetMenuItemCount
AppendMenuW
GetFocus
GetDesktopWindow
GetKeyState
GetWindow
GetTopWindow
PostMessageW
MoveWindow
GetWindowTextLengthW
GetWindowTextW
SetWindowTextW
ScreenToClient
DestroyAcceleratorTable
DestroyMenu
CreatePopupMenu
GetWindowRect
GetWindowLongW
PtInRect
PeekMessageW
TrackPopupMenuEx
IsWindow
MapWindowPoints
MessageBeep
SetWindowPos
GetClientRect
LoadStringA
PostQuitMessage
SetFocus
IsWindowVisible
LoadStringW
CallNextHookEx
UnhookWindowsHookEx
SetWindowsHookExW
SendMessageW
RegisterWindowMessageW
FindWindowW
UnregisterClassA
gdi32
GetStockObject
GetDeviceCaps
CreateFontIndirectW
TranslateCharsetInfo
CreateCompatibleBitmap
CreateCompatibleDC
GetObjectW
DeleteObject
DeleteDC
SelectObject
BitBlt
CreateSolidBrush
advapi32
RegCloseKey
RegQueryInfoKeyW
RegQueryValueExW
RegDeleteValueW
RegCreateKeyExW
RegSetValueExW
RegOpenKeyExW
RegEnumKeyExW
RegDeleteKeyW
ole32
CoTaskMemFree
CoTaskMemRealloc
OleUninitialize
CoTaskMemAlloc
StringFromGUID2
OleLockRunning
CoCreateInstance
CoGetClassObject
CLSIDFromProgID
CLSIDFromString
CreateStreamOnHGlobal
OleInitialize
oleaut32
VariantInit
VariantClear
SysAllocString
SysStringByteLen
LoadTypeLi
LoadRegTypeLi
OleCreateFontIndirect
VarUI4FromStr
SysAllocStringLen
SysFreeString
SysStringLen
msvcr80
swprintf_s
free
memset
wcsncpy_s
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
_encode_pointer
__set_app_type
?terminate@@YAXXZ
_unlock
__dllonexit
_lock
_onexit
_decode_pointer
_except_handler4_common
memcpy
memmove_s
_recalloc
_configthreadlocale
memcmp
memcpy_s
malloc
wcsstr
_vsnwprintf_s
_amsg_exit
__getmainargs
_cexit
_exit
_XcptFilter
_ismbblead
exit
_acmdln
_initterm
_invoke_watson
_controlfp_s
_crt_debugger_hook
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_initterm_e
__CxxFrameHandler3
_CxxThrowException
Sections
.text Size: 52KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 652KB - Virtual size: 652KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE