??4l4linkSt@@QAEAAU0@ABU0@@Z
Static task
static1
Behavioral task
behavioral1
Sample
a0d871ec8efb36df595faf55772f8549856c921785446b7f4f5b443557d8f298.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a0d871ec8efb36df595faf55772f8549856c921785446b7f4f5b443557d8f298.exe
Resource
win10v2004-20220812-en
General
-
Target
a0d871ec8efb36df595faf55772f8549856c921785446b7f4f5b443557d8f298
-
Size
728KB
-
MD5
6aff3823b9af2897513a50413a163aef
-
SHA1
1d1a9e71ea5ee43c0b0bde30181c423aee71a711
-
SHA256
a0d871ec8efb36df595faf55772f8549856c921785446b7f4f5b443557d8f298
-
SHA512
f0b370bb53dcaa2bcad6f6b1c2df8b331f1684e4698a6db80ca4dcc95c0856fa71debec480e4ca7cc3db29db5edabd30e3942261b2b3ac27b5d03fc5339555f4
-
SSDEEP
12288:B3YiKOdcycRRHuaHQPJpR/AidmofImUJxLW1CRJi:BIiKOODQxf7dmog/Jxbji
Malware Config
Signatures
Files
-
a0d871ec8efb36df595faf55772f8549856c921785446b7f4f5b443557d8f298.exe windows x86
faf15e885c6c2e32d79f8ebcb2f30d7c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
learn32
ord147
ord215
ord196
ord164
ord82
ord133
ord115
ord90
ord87
ord20
ord15
ord139
ord119
ord84
ord203
ord18
ord22
ord21
ord155
ord151
ord440
ord158
ord160
ord142
ord145
ord140
ord388
ord434
ord432
ord92
ord342
ord344
ord110
ord125
ord41
ord208
ord210
ord212
ord211
ole32
OleFlushClipboard
OleIsCurrentClipboard
CoRevokeClassObject
CoRegisterMessageFilter
CoFreeUnusedLibraries
OleUninitialize
OleInitialize
StringFromIID
kernel32
GetTickCount
TlsFree
TlsAlloc
LocalReAlloc
TlsGetValue
MulDiv
GlobalHandle
TlsSetValue
GetProcessVersion
GetOEMCP
SetErrorMode
GlobalFlags
FileTimeToLocalFileTime
RtlUnwind
RaiseException
GetStartupInfoA
GetCommandLineA
ExitProcess
HeapAlloc
SizeofResource
FileTimeToSystemTime
SetStdHandle
GetFileType
HeapReAlloc
HeapSize
GetACP
SetUnhandledExceptionFilter
LCMapStringA
LCMapStringW
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
LocalAlloc
WaitForSingleObject
GetStdHandle
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetProcAddress
MultiByteToWideChar
FreeLibrary
FormatMessageA
LocalFree
GetPrivateProfileIntA
CreateProcessA
FindFirstFileA
SetFileAttributesA
FindNextFileA
FindClose
RemoveDirectoryA
GetWindowsDirectoryA
Sleep
SetLastError
GetLastError
WritePrivateProfileStringA
DeleteFileA
lstrlenA
GetPrivateProfileStringA
GetPrivateProfileSectionNamesA
lstrcmpiA
GetDriveTypeA
GetProfileStringA
GetFileTime
GetFileSize
GetFileAttributesA
GetFullPathNameA
GetVolumeInformationA
MoveFileA
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
ReadFile
DuplicateHandle
lstrcatA
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
GetModuleHandleA
GlobalFree
LockResource
FindResourceA
LoadResource
WideCharToMultiByte
InterlockedDecrement
InterlockedIncrement
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
GetVersion
InitializeCriticalSection
GlobalReAlloc
GlobalAlloc
GlobalLock
GlobalUnlock
lstrcpynA
lstrcmpA
GetCPInfo
CreateFileA
GetModuleFileNameA
lstrcpyA
WriteFile
GetCurrentThread
GetCurrentProcess
CloseHandle
CopyFileA
LoadLibraryA
GetEnvironmentStringsW
SetHandleCount
HeapFree
TerminateProcess
GetTimeZoneInformation
user32
GetCapture
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
MessageBoxA
GetMenuItemCount
GetSubMenu
GetMenuItemID
GetWindowTextLengthA
GetWindowTextA
GetDlgCtrlID
GetKeyState
DefWindowProcA
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetLastActivePopup
GetTopWindow
SetWindowPos
CopyRect
IntersectRect
SystemParametersInfoA
EndPaint
BeginPaint
GetWindowDC
GetDC
ReleaseDC
ClientToScreen
IsIconic
GetWindowPlacement
GetWindowRect
GetNextDlgTabItem
EndDialog
GetActiveWindow
SetActiveWindow
IsWindow
GetSystemMetrics
CreateDialogIndirectParamA
DestroyWindow
GetParent
GetWindowLongA
GetDlgItem
IsWindowEnabled
UpdateWindow
wsprintfA
EnableWindow
FindWindowA
IsWindowVisible
GetWindow
SetWindowLongA
SendMessageA
GetDesktopWindow
PtInRect
GetClassNameA
GetClientRect
ScreenToClient
AdjustWindowRectEx
SetFocus
GetFocus
DispatchMessageA
PeekMessageA
GetSysColor
MapWindowPoints
SendDlgItemMessageA
PostMessageA
LoadIconA
IsDialogMessageA
SetWindowTextA
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
LoadBitmapA
InflateRect
InvalidateRect
TabbedTextOutA
PostThreadMessageA
DestroyMenu
GetSysColorBrush
LoadCursorA
GrayStringA
DrawTextA
RegisterWindowMessageA
OffsetRect
RegisterClipboardFormatA
GetMessageA
TranslateMessage
ValidateRect
GetCursorPos
SetCursor
PostQuitMessage
CharUpperA
LoadStringA
GetMenuCheckMarkDimensions
GetForegroundWindow
SetForegroundWindow
ShowWindow
EnableMenuItem
DrawFocusRect
DefDlgProcA
ShowCaret
HideCaret
UnregisterClassA
CharNextA
IsWindowUnicode
ExcludeUpdateRgn
gdi32
DeleteObject
CreateDIBitmap
DeleteDC
GetStockObject
GetDeviceCaps
GetTextExtentPointA
SelectObject
CreateBitmap
GetObjectA
SetBkColor
SetTextColor
GetClipBox
RestoreDC
SetBkMode
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
IntersectClipRect
CreateSolidBrush
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
PatBlt
BitBlt
CreateCompatibleDC
SaveDC
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegOpenKeyExA
RegQueryInfoKeyA
OpenThreadToken
RegSetValueExA
RegCreateKeyExA
RegEnumKeyExA
RegDeleteKeyA
FreeSid
OpenProcessToken
GetTokenInformation
AllocateAndInitializeSid
EqualSid
RegCloseKey
RegQueryValueExA
RegDeleteValueA
shell32
SHGetSpecialFolderLocation
SHGetPathFromIDListA
SHGetMalloc
SHChangeNotify
comctl32
ord17
oledlg
ord8
wininet
HttpQueryInfoA
InternetReadFile
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallback
InternetOpenUrlA
InternetCloseHandle
InternetOpenA
InternetQueryOptionA
InternetCrackUrlA
InternetCanonicalizeUrlA
InternetGetLastResponseInfoA
InternetQueryDataAvailable
Exports
Exports
Sections
.text Size: 136KB - Virtual size: 134KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 36KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: 500KB - Virtual size: 1.6MB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE