Static task
static1
Behavioral task
behavioral1
Sample
fe783faf061a47924b5bfefc4ded2629786240a61226bb63e553689f437052f0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
fe783faf061a47924b5bfefc4ded2629786240a61226bb63e553689f437052f0.exe
Resource
win10v2004-20220901-en
General
-
Target
fe783faf061a47924b5bfefc4ded2629786240a61226bb63e553689f437052f0
-
Size
149KB
-
MD5
800fe1accc6ba217ba90b2394f39a470
-
SHA1
a237150e574fb7445b8028eecabffb3d9d603d8d
-
SHA256
fe783faf061a47924b5bfefc4ded2629786240a61226bb63e553689f437052f0
-
SHA512
3137fce57c4d33abf24752e94336b409e93af34f6cff15a67af652b4ccbab1f76d5b76d6537141b758855318c853d7a9bc4345306bef616c3c8b1d46c09d0846
-
SSDEEP
3072:JWYbulEpGshblG7OOrweqScMtqoChhELi2L2IHi+xAoxZ:JQEAshRG7OOrVqxMIJbEL1L2P+xAKZ
Malware Config
Signatures
Files
-
fe783faf061a47924b5bfefc4ded2629786240a61226bb63e553689f437052f0.exe windows x86
ee3b0014d4d98eb39fdaff52440d44da
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
yui
?GetLayoutEngine@yui@@YAPAVILayoutEngine@1@XZ
advapi32
RegDeleteValueW
RegCreateKeyExW
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
RegSetValueExW
RegDeleteKeyW
RegQueryInfoKeyW
RegEnumKeyExW
kernel32
MultiByteToWideChar
lstrlenA
GetPrivateProfileStringW
GetModuleFileNameW
lstrcpynW
WideCharToMultiByte
lstrlenW
GetVersionExW
RaiseException
EnterCriticalSection
LeaveCriticalSection
FlushInstructionCache
GetCurrentProcess
GetCurrentThreadId
SetLastError
InitializeCriticalSection
DeleteCriticalSection
GetTimeFormatW
GlobalAddAtomW
GlobalDeleteAtom
ReleaseMutex
InterlockedIncrement
FindResourceExW
lstrcmpiW
CloseHandle
FreeLibrary
LoadLibraryExW
GetModuleHandleW
LoadLibraryW
WaitForSingleObject
GetCommandLineW
CreateMutexW
WinExec
GetStartupInfoA
Sleep
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
LoadLibraryA
GetProcAddress
InterlockedCompareExchange
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
SetUnhandledExceptionFilter
IsDebuggerPresent
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
FindResourceW
LoadResource
LockResource
SizeofResource
GetLastError
GetSystemTimeAsFileTime
InterlockedDecrement
UnhandledExceptionFilter
TerminateProcess
user32
EndDialog
SetFocus
RegisterClassW
DefWindowProcW
BeginPaint
LoadCursorW
DestroyWindow
IsWindow
CreateDialogParamW
DialogBoxParamW
GetActiveWindow
SetForegroundWindow
MoveWindow
UnregisterClassA
SetMenuDefaultItem
GetCursorPos
TrackPopupMenu
GetClientRect
CreateWindowExW
TranslateMessage
DispatchMessageW
IsDialogMessageW
LoadImageW
RegisterClassExW
CallWindowProcW
PostQuitMessage
GetClassInfoExW
PostMessageW
UnregisterHotKey
RegisterHotKey
ScreenToClient
RedrawWindow
SetTimer
KillTimer
LoadMenuW
GetMenuItemCount
GetMenuStringW
GetSubMenu
LoadStringW
GetSysColor
GetMessageW
FillRect
DrawTextW
EndPaint
CharNextW
SetMenuItemInfoW
GetDesktopWindow
GetWindowLongW
GetWindowRect
GetDC
ReleaseDC
SetWindowPos
SetWindowTextW
EnableWindow
ShowWindow
GetDlgItem
GetParent
SendDlgItemMessageW
SendMessageW
SetWindowLongW
DestroyMenu
RegisterWindowMessageW
gdi32
GetDeviceCaps
CreateSolidBrush
SetBkColor
SelectObject
SetBkMode
SetTextColor
DeleteObject
shell32
Shell_NotifyIconW
ole32
CoTaskMemFree
CoCreateInstance
CoTaskMemRealloc
CoTaskMemAlloc
oleaut32
VarUI4FromStr
shlwapi
PathRemoveFileSpecW
msvcp80
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@PB_W@Z
??Y?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV01@PB_W@Z
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@XZ
??1?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@XZ
?c_str@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QBEPB_WXZ
??4?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV01@PB_W@Z
msvcr80
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_amsg_exit
_except_handler4_common
_decode_pointer
_onexit
_lock
_encode_pointer
__dllonexit
_unlock
?terminate@@YAXXZ
wcsncpy_s
malloc
swprintf_s
srand
rand
_initterm_e
wcscpy_s
_wcsicmp
wcsncat
_wtoi
vswprintf_s
_vscwprintf
memset
??_V@YAXPAX@Z
wcsrchr
wcsstr
__CxxFrameHandler3
_recalloc
calloc
free
memmove_s
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_CxxThrowException
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
_invoke_watson
??2@YAPAXI@Z
??3@YAXPAX@Z
memcpy_s
_controlfp_s
Sections
.text Size: 44KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.yrdata Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE