Static task
static1
Behavioral task
behavioral1
Sample
2995c65942515c3551c6234052abeea101b89a9de3e2063fdbe5ea73ac44e490.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
2995c65942515c3551c6234052abeea101b89a9de3e2063fdbe5ea73ac44e490.exe
Resource
win10v2004-20220812-en
General
-
Target
2995c65942515c3551c6234052abeea101b89a9de3e2063fdbe5ea73ac44e490
-
Size
264KB
-
MD5
4dd6a661f3e599ccaeb0e32776734ff5
-
SHA1
f4c07970c9a002f038fa94190cd0e557ca6bcb35
-
SHA256
2995c65942515c3551c6234052abeea101b89a9de3e2063fdbe5ea73ac44e490
-
SHA512
05bc9caf80dba8e647dc46a7fc248ee8369c8740f018c3585faf26f5d1298691b2724bd3cb98446e0a8770f37ba3d040ffa12dd20e965e0d88954d225343cf3a
-
SSDEEP
3072:sZpNtQGgGSTgC3O3pKicj2+cilWma71dTOo0hwV8tAvC1quLl9g:shtQGgGSV3RiIJa71xO3SaA
Malware Config
Signatures
Files
-
2995c65942515c3551c6234052abeea101b89a9de3e2063fdbe5ea73ac44e490.exe windows x86
f6f2a5ec6fe9c4a0f0a9aa3767802cfb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegQueryValueExA
RegDeleteValueA
RegCloseKey
RegSetValueExA
RegCreateKeyExA
RegOpenKeyExA
comdlg32
GetSaveFileNameA
GetOpenFileNameA
comctl32
InitCommonControlsEx
kernel32
GetFileAttributesA
MultiByteToWideChar
GetVersionExA
GetModuleFileNameA
SetEnvironmentVariableA
CompareStringW
CompareStringA
ReadFile
SetEndOfFile
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
CreateFileA
FlushFileBuffers
InitializeCriticalSection
InterlockedExchange
SetFilePointer
VirtualQuery
GetSystemInfo
VirtualProtect
GetStringTypeW
GetStringTypeA
GetLocaleInfoA
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
SetStdHandle
CloseHandle
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
DeleteCriticalSection
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetStdHandle
WriteFile
GetCPInfo
GetOEMCP
GetACP
HeapSize
GetCurrentProcess
TerminateProcess
ExitProcess
HeapAlloc
HeapReAlloc
LCMapStringW
LCMapStringA
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
SetLastError
TlsAlloc
LeaveCriticalSection
EnterCriticalSection
HeapFree
DeleteFileA
MoveFileA
GetLastError
GetCommandLineA
GetStartupInfoA
GetModuleHandleA
RtlUnwind
MulDiv
GlobalFree
GlobalReAlloc
GlobalUnlock
GlobalAlloc
GetProcAddress
FreeLibrary
LoadLibraryA
WideCharToMultiByte
GlobalSize
GlobalLock
user32
GetMenuDefaultItem
ReleaseDC
GetWindow
DestroyCursor
SendDlgItemMessageA
EndDialog
CreateDialogParamA
DialogBoxParamA
CreateWindowExA
SetMenuDefaultItem
CheckMenuItem
GetClipboardOwner
OpenClipboard
CloseClipboard
RegisterClipboardFormatA
IsClipboardFormatAvailable
GetClipboardData
EmptyClipboard
SetClipboardData
GetSystemMetrics
TrackPopupMenu
DestroyMenu
LoadMenuA
LoadBitmapA
GetMenuItemInfoA
GetMenuItemCount
GetMenuItemID
GetMenuState
GetSubMenu
GetMenuStringA
ModifyMenuA
FindWindowA
MessageBeep
GetMessageA
IsWindow
IsDialogMessageA
TranslateMessage
DispatchMessageA
UnhookWindowsHookEx
PostQuitMessage
RegisterWindowMessageA
GetCursorPos
SetForegroundWindow
PostMessageA
SendMessageA
SetWindowsHookExA
LoadIconA
UpdateWindow
WinHelpA
BringWindowToTop
RegisterClassExA
SetCursor
GetSysColor
SetFocus
MessageBoxA
GetSystemMenu
LoadStringA
AppendMenuA
GetFocus
GetDlgCtrlID
DestroyWindow
EnableWindow
GetDesktopWindow
GetWindowRect
SetWindowPos
IntersectRect
IsWindowVisible
ScreenToClient
ShowWindow
SetWindowTextA
CallWindowProcA
InflateRect
DrawFrameControl
GetWindowTextA
DrawStateA
DrawFocusRect
GetClientRect
DestroyIcon
InvalidateRect
SetWindowLongA
DefWindowProcA
GetWindowLongA
GetDlgItem
LoadImageA
GetDC
GetTopWindow
gdi32
ExtTextOutA
SetBkColor
CreateCompatibleDC
BitBlt
DeleteDC
GetDeviceCaps
RemoveFontResourceA
AddFontResourceA
SetBkMode
CreateSolidBrush
GetObjectA
CreateFontIndirectA
EnumFontFamiliesExA
SelectObject
Rectangle
GetTextExtentPoint32A
SetTextColor
GetStockObject
DeleteObject
shell32
ShellExecuteA
ukhook40
?VnConvGetOptions@@YAXPAU_VnConvOptions@@@Z
VnFileConvert
?genConvert@@YAHAAVVnCharset@@0AAVByteInStream@@AAVByteOutStream@@@Z
?VnConvResetOptions@@YAXPAU_VnConvOptions@@@Z
?VnCharsetLibObj@@3VCVnCharsetLib@@A
?VnConvErrMsg@@YAPBDH@Z
?GetVietHookDll@@YAPAUHINSTANCE__@@XZ
?IsVietnamese@@YAHXZ
?getVnCharset@CVnCharsetLib@@QAEPAVVnCharset@@H@Z
?VnConvSetOptions@@YAXPAU_VnConvOptions@@@Z
?ModifyStatusIcon@@YAXXZ
?UkStoreKeyOrderMap@@YAHPBDPAUUkKeyMapPair@@H@Z
?MsViMethodMapping@@3PAUUkKeyMapping@@A
?VIQRMethodMapping@@3PAUUkKeyMapping@@A
?VniMethodMapping@@3PAUUkKeyMapping@@A
?SimpleTelexMethodMapping@@3PAUUkKeyMapping@@A
?TelexMethodMapping@@3PAUUkKeyMapping@@A
?UkLoadKeyOrderMap@@YAHPBDPAUUkKeyMapPair@@PAH@Z
?getText@CMacroTable@@QAEPBIH@Z
?getKey@CMacroTable@@QAEPBIH@Z
VnConvert
?SetUnikeyOptions@@YAXPAU_UnikeyOptions@@H@Z
?SetOutputCharset@@YAHH@Z
?loadFromFile@CMacroTable@@QAEHPBD@Z
?writeToFile@CMacroTable@@QAEHPBD@Z
?addItem@CMacroTable@@QAEHPBX0H@Z
?resetContent@CMacroTable@@QAEXXZ
?UnikeyLoadMacro@@YAXPBD@Z
?UnikeyLoadUserKeyMap@@YAHPBD@Z
?init@CMacroTable@@QAEXXZ
?SetUnikeyReady@@YAXXZ
?SetInputMethod@@YAHW4UkInputMethod@@@Z
?EnableUnikey@@YAXH@Z
?SetUnikeySysInfo@@YAXPAU_UnikeySysInfo@@@Z
?InitUkHook@@YAXXZ
?MyMouseHook@@YGJHIJ@Z
?MyKeyHook@@YGJHIJ@Z
?SetSwitchKey@@YAXH@Z
?RecreateStatusIcon@@YAXXZ
?SwitchMode@@YAXXZ
?DeleteStatusIcon@@YAXXZ
Sections
.text Size: 96KB - Virtual size: 92KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 164KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 92KB - Virtual size: 92KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
coquahl Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE