Static task
static1
Behavioral task
behavioral1
Sample
01793d8c25cecb99afd17a1b113fdff6be89e9a7bc541adb56e78b7e08a66103.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
01793d8c25cecb99afd17a1b113fdff6be89e9a7bc541adb56e78b7e08a66103.exe
Resource
win10v2004-20220812-en
General
-
Target
01793d8c25cecb99afd17a1b113fdff6be89e9a7bc541adb56e78b7e08a66103
-
Size
320KB
-
MD5
5b9081c61119b3d0d89b529068b6fd10
-
SHA1
c7e11a929ce868b31cfeb265d9f4d36873e34fd5
-
SHA256
01793d8c25cecb99afd17a1b113fdff6be89e9a7bc541adb56e78b7e08a66103
-
SHA512
025b41c7149bf669d20234d3122248638400d5d9ef4409cf142a0e7a277d5e47bcafc1c6b3c3452fc79719c913a5536df48e418900101832d460fc2e617749d5
-
SSDEEP
6144:IkmGyVLGVVIqx8S3fY13UvDTBB4OzjC8KVRc:IkmGyVG6Z3UvDT8w
Malware Config
Signatures
Files
-
01793d8c25cecb99afd17a1b113fdff6be89e9a7bc541adb56e78b7e08a66103.exe windows x86
6ede40d2f65b8f56b12189a40fbf0327
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
PathFileExistsW
PathUnquoteSpacesW
PathRemoveBlanksW
PathRemoveArgsW
SHDeleteKeyW
PathRemoveFileSpecW
gdiplus
GdipDrawLineI
GdipDeletePen
GdipCreatePen1
GdiplusShutdown
GdiplusStartup
GdipFillRectangleI
GdipCreateFromHDC
GdipDeleteGraphics
GdipCreateLineBrushFromRectWithAngleI
GdipDeleteBrush
ngscm
?Init@CNbuuLib@@SAXPAUHINSTANCE__@@0@Z
??0CNbuuWindowBackgroundSkin@@QAE@XZ
?NGSCM_GetCommonNGR@@YAPAUHINSTANCE__@@XZ
?PcsLoadFont@@YAXPAUtagLOGFONTW@@@Z
?TranslateMenuAccelerator@CNbuuWindowBackgroundCtrl@@QAEHPAUtagMSG@@@Z
?AlphaBlendBitmaps@CNBitmapUtil@@QAEHHHH@Z
?CreateColorBackground@CNBitmapUtil@@QAEHKHH@Z
?DeleteBitmap@CNBitmapUtil@@QAEPAUHBITMAP__@@W4BitmapType@@H@Z
?AlphaBlendBitmapsBGPos@CNBitmapUtil@@QAEHHHHHH@Z
?NLoadBitmap@CNBitmapUtil@@QAEPAUHBITMAP__@@PAUHINSTANCE__@@HW4BitmapType@@H@Z
??0CNBitmapUtil@@QAE@XZ
?GetBitmapHeight@CNBitmapUtil@@QAEHW4BitmapType@@@Z
?GetBitmapWidth@CNBitmapUtil@@QAEHW4BitmapType@@@Z
?GetBitmapHandle@CNBitmapUtil@@QAEPAUHBITMAP__@@W4BitmapType@@H@Z
?Hide@CNbuuSplashScreen@@QAEHI@Z
??1CNBitmapUtil@@QAE@XZ
?PcsLoadColor@@YAKPAUHINSTANCE__@@I@Z
??1CNbuuComboBoxCtrl@@UAE@XZ
??0CNbuuComboBoxCtrl@@QAE@XZ
?GetNextPhoneManufacturer@CPCSL2InfoReader@@QAEPBGXZ
?GetFirstPhoneManufacturer@CPCSL2InfoReader@@QAEPBGXZ
?OnEraseBkGnd@CNbuuSplashScreen@@EAEJIJ@Z
?OnPaint@CNbuuSplashScreen@@EAEJIJ@Z
??1CNbuuWindowBackgroundSkin@@UAE@XZ
?NGSCM_Finalize@@YAXXZ
?DoModal@CCommonAboutDlg@@QAEHXZ
?SetAboutBoxParams@CCommonAboutDlg@@QAEXPAUtagABOUTBOXPARAMS@@@Z
??1CCommonAboutDlg@@UAE@XZ
??0CCommonAboutDlg@@QAE@XZ
??1CNbuuSplashScreen@@UAE@XZ
?Show@CNbuuSplashScreen@@QAEHI@Z
??0CNbuuSplashScreen@@QAE@PAUHINSTANCE__@@I@Z
?PcsInitializeWER@@YAHXZ
?GetUIManufacturer@CPCSL2InfoReader@@QAEPBGXZ
?ReadPCSL@CPCSL2InfoReader@@QAEHPAG@Z
??1CPCSL2InfoReader@@QAE@XZ
??0CPCSL2InfoReader@@QAE@XZ
?Show@CNbuuCommonMessageBox@@SAHPAUHWND__@@PBG1I@Z
?SetTooltip@?$CNbuuButtonImpl@VCNbuuCommonButtonSkin@@@@QAEXPAG@Z
??1CNbuuStaticCtrl@@UAE@XZ
?m_dwLayout@CNbuuLib@@0KA
??0CNbuuStaticCtrl@@QAE@XZ
??1CNbuuCheckButtonCtrl@@UAE@XZ
??0CNbuuCheckButtonCtrl@@QAE@XZ
??1CNbuuCommonButtonCtrl@@UAE@XZ
??0CNbuuCommonButtonCtrl@@QAE@XZ
??1CNbuuWindowBackgroundCtrl@@UAE@XZ
??0CNbuuWindowBackgroundCtrl@@QAE@XZ
mfc80u
ord2708
ord4301
ord2829
ord2725
ord2531
ord5196
ord1955
ord5171
ord1353
ord4961
ord3339
ord6275
ord3796
ord6273
ord1513
ord2163
ord2169
ord2399
ord2381
ord2379
ord2402
ord2407
ord2388
ord2404
ord931
ord927
ord929
ord925
ord920
ord5956
ord1591
ord4276
ord4716
ord3397
ord5199
ord4179
ord6271
ord5067
ord1899
ord5148
ord4238
ord1392
ord3940
ord1608
ord1611
ord5908
ord6720
ord1661
ord1662
ord2011
ord4884
ord5178
ord266
ord265
ord762
ord557
ord745
ord5442
ord1923
ord3872
ord1086
ord6002
ord2860
ord2424
ord4109
ord386
ord631
ord2279
ord3925
ord1176
ord3460
ord3642
ord395
ord635
ord4293
ord5161
ord3395
ord6061
ord2366
ord4259
ord4271
ord1297
ord2164
ord5201
ord5144
ord1393
ord3939
ord5911
ord6721
ord4013
ord2418
ord2419
ord5352
ord940
ord4898
ord2933
ord4129
ord4303
ord5006
ord5003
ord2609
ord1904
ord2237
ord2985
ord572
ord715
ord3157
ord1925
ord3678
ord3204
ord3281
ord501
ord709
ord3133
ord1271
ord5637
ord4117
ord3995
ord3286
ord4255
ord5210
ord1572
ord1634
ord3677
ord757
ord1155
ord1049
ord1117
ord4025
ord547
ord956
ord334
ord593
ord5221
ord6086
ord5654
ord2239
ord3327
ord4475
ord2832
ord5562
ord5209
ord5226
ord4562
ord3942
ord5222
ord5220
ord2925
ord1911
ord3826
ord5378
ord6215
ord3800
ord5579
ord2856
ord6274
ord3795
ord6272
ord4008
ord4032
ord3444
ord3639
ord368
ord616
ord4699
ord6751
ord6749
ord4258
ord4476
ord2762
ord3034
ord4216
ord1913
ord4251
ord5408
ord1370
ord5588
ord5152
ord2007
ord6234
ord2615
ord2608
ord4560
ord3585
ord4346
ord3676
ord565
ord756
ord1627
ord1539
ord3166
ord1922
ord1474
ord4092
ord2080
ord4228
ord592
ord416
ord651
ord1960
ord5170
ord347
ord1270
ord5609
ord5727
ord1957
ord4585
ord602
ord1920
ord4300
ord1562
ord1299
ord2167
ord5522
ord5829
ord1272
ord2364
ord1946
ord4094
ord2085
ord3238
ord1274
ord6140
ord2365
ord4267
ord2788
ord2361
ord2255
ord5867
ord1352
ord3338
ord5147
ord3968
ord4855
ord4858
ord4373
ord4378
ord4375
ord4393
ord4395
ord4380
ord4771
ord4175
ord4166
ord4775
ord4198
ord4784
ord4437
ord4438
ord1051
ord1021
ord2898
ord1431
ord741
ord6033
ord4119
ord3311
ord4234
ord2086
ord1178
ord3483
ord3645
ord658
ord6116
ord4755
ord4232
ord2083
ord642
ord3208
ord4230
ord2534
ord1628
ord293
ord577
ord6063
ord5803
ord1590
ord1646
ord1647
ord2397
ord2409
ord2386
ord2390
ord2392
ord2394
ord2384
ord5229
ord5231
ord1542
ord280
ord774
ord776
ord283
ord287
ord5711
ord2460
ord6700
ord282
ord1479
ord6094
ord3990
ord5558
ord4100
ord6173
ord5524
ord2261
ord5485
ord1476
ord778
ord3869
ord2271
ord2745
ord1472
ord2260
ord896
ord2444
ord4078
ord5398
ord6301
ord3103
ord2121
ord2311
ord1548
ord1118
ord4026
ord566
ord5971
ord1058
ord5096
ord1007
ord2009
ord4320
ord290
ord5484
ord1906
ord900
ord899
ord1236
ord3873
ord5869
ord5862
ord777
ord5712
ord2893
ord6039
ord5930
ord4733
ord4846
ord5491
ord2736
ord2042
ord6167
ord1235
ord860
ord2876
ord3842
ord6177
ord2742
ord277
ord1582
ord2461
ord1252
ord1248
ord2640
ord2527
ord3712
ord3713
ord3703
ord2638
ord3943
ord4480
ord4256
ord1894
ord4729
ord1079
ord4574
ord3635
ord1784
ord605
ord354
ord3435
ord764
ord1198
ord2054
ord1549
msvcr80
memset
_amsg_exit
__wgetmainargs
_cexit
_exit
_XcptFilter
exit
_wcmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
_encode_pointer
__set_app_type
_unlock
calloc
_lock
_onexit
_decode_pointer
?terminate@@YAXXZ
_except_handler4_common
_invoke_watson
_controlfp_s
_crt_debugger_hook
?_type_info_dtor_internal_method@type_info@@QAEXXZ
??0exception@std@@QAE@ABV01@@Z
_invalid_parameter_noinfo
fclose
_wtol
feof
fgetws
_wfopen
ceil
??0exception@std@@QAE@XZ
??1exception@std@@UAE@XZ
??0exception@std@@QAE@ABQBD@Z
malloc
_swprintf
_vswprintf
_purecall
_wstat64i32
_wcsdup
wcstok
wcsstr
free
floor
__RTDynamicCast
ftell
fseek
_wgetenv
_wcsicmp
__dllonexit
_CxxThrowException
memcpy
__CxxFrameHandler3
?what@exception@std@@UBEPBDXZ
kernel32
GetCurrentProcessId
OpenProcess
Process32FirstW
Module32FirstW
Module32NextW
Process32NextW
LoadResource
lstrlenW
InitializeCriticalSection
DeleteCriticalSection
IsDebuggerPresent
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
SetUnhandledExceptionFilter
GetStartupInfoW
InterlockedCompareExchange
InterlockedExchange
OpenEventA
CreateEventA
ResetEvent
WaitForMultipleObjects
SetEvent
WaitForSingleObject
LoadLibraryA
ReadFile
SetFilePointer
GetFileSizeEx
ExitThread
HeapFree
GetProcessHeap
HeapAlloc
SetFileAttributesW
GetFileAttributesW
GetLogicalDrives
GetVersionExW
GetProcAddress
SetLastError
LeaveCriticalSection
EnterCriticalSection
GetTempPathW
WriteFile
CreateFileW
DeleteFileW
LockResource
lstrcpyW
CreateThread
LoadLibraryExW
FreeLibrary
Sleep
GlobalUnlock
GlobalFree
LoadLibraryW
GetLastError
GetCommandLineW
CloseHandle
GetModuleFileNameW
GetModuleHandleW
CreateToolhelp32Snapshot
FindResourceW
user32
GetSysColor
GetSubMenu
CheckMenuRadioItem
TrackPopupMenu
CreateMenu
CreatePopupMenu
AppendMenuW
GetFocus
DrawTextW
BeginPaint
EndPaint
DrawIconEx
OffsetRect
GetDlgCtrlID
GetParent
GetWindow
InvalidateRect
ReleaseDC
GetWindowDC
GetDC
SetWindowTextW
LoadImageW
PostMessageW
GetWindowLongW
SetWindowLongW
GetClientRect
EnableWindow
SetFocus
GetDlgItem
SendMessageW
UpdateWindow
GetSystemMenu
IsIconic
UnregisterClassW
GetCapture
SetForegroundWindow
LoadIconW
DefWindowProcW
SetProcessDefaultLayout
GetLastActivePopup
InflateRect
FillRect
GetWindowRect
MapWindowPoints
IsWindowEnabled
SetCapture
LoadStringW
GetDesktopWindow
ReleaseCapture
SetCursor
PtInRect
FindWindowW
LoadCursorW
LoadMenuW
GetSystemMetrics
EnableMenuItem
DestroyMenu
SystemParametersInfoW
gdi32
SetTextColor
SetBkMode
CreateFontIndirectW
GetBkColor
BitBlt
SelectObject
CreateSolidBrush
CreateCompatibleDC
DeleteObject
CreatePen
advapi32
OpenProcessToken
RegQueryValueExW
RegCloseKey
LookupAccountSidW
GetTokenInformation
RegSetValueExW
RegQueryValueExA
RegOpenKeyExA
RegOpenKeyExW
shell32
SHGetSpecialFolderPathW
SHGetSpecialFolderLocation
SHGetMalloc
SHGetFileInfoW
SHGetDesktopFolder
SHGetPathFromIDListW
ord68
SHParseDisplayName
ole32
CoUninitialize
CoInitialize
CoInitializeEx
CoCreateInstance
oleaut32
SafeArrayGetUBound
SysFreeString
SafeArrayPutElement
SafeArrayGetElement
SafeArrayRedim
SysAllocStringLen
SafeArrayCreate
SafeArrayDestroy
SafeArrayGetLBound
SysStringLen
SysAllocString
msvcp80
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
Sections
.text Size: 172KB - Virtual size: 171KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 59KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 86KB - Virtual size: 87KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
vexdhbl Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE