Static task
static1
Behavioral task
behavioral1
Sample
96dd446259d19b24eae55f078ea5f0e6341eac0b251e42291ea976b43f61c841.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
96dd446259d19b24eae55f078ea5f0e6341eac0b251e42291ea976b43f61c841.exe
Resource
win10v2004-20220812-en
General
-
Target
96dd446259d19b24eae55f078ea5f0e6341eac0b251e42291ea976b43f61c841
-
Size
700KB
-
MD5
80895266012fb9bc864f736d6de01a20
-
SHA1
8e4c559e8b17e89de20670352e56c955554c9583
-
SHA256
96dd446259d19b24eae55f078ea5f0e6341eac0b251e42291ea976b43f61c841
-
SHA512
02005328059e75b5c6f3b2113a62530d0bb1f199b3c069d618717128947e8dc1f27efe4b75d4eede916fdc3fb492f33e9b77835c8fba450f0be7aebbca6ef545
-
SSDEEP
12288:nobwrU8FlyOODZAfdk28vI/QGErGr+QK72zCmSfh7LJnNOr0MJEch9+ZXTu9oo3+:obw48D8Zb772up89TVR+5PaG5
Malware Config
Signatures
Files
-
96dd446259d19b24eae55f078ea5f0e6341eac0b251e42291ea976b43f61c841.exe windows x86
13167f32ea63949991cb367e1b2e1543
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetCurrentProcessId
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
GetTimeZoneInformation
GetUserDefaultLCID
UnhandledExceptionFilter
IsValidLocale
IsValidCodePage
SetStdHandle
IsBadReadPtr
IsBadCodePtr
GetLocaleInfoW
SetEnvironmentVariableA
LCMapStringW
LCMapStringA
GetFileType
GetStdHandle
SetHandleCount
IsBadWritePtr
VirtualFree
HeapCreate
HeapDestroy
HeapSize
FindNextFileA
SetCurrentDirectoryA
TerminateProcess
HeapReAlloc
ExitProcess
RtlUnwind
GetCommandLineA
GetStartupInfoA
VirtualQuery
GetSystemInfo
VirtualAlloc
VirtualProtect
HeapAlloc
GetSystemTimeAsFileTime
HeapFree
FileTimeToLocalFileTime
SetErrorMode
GetFileTime
GetFileAttributesA
CreateFileA
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetCurrentDirectoryA
FileTimeToSystemTime
GetOEMCP
GetCPInfo
GlobalFlags
RaiseException
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
TlsGetValue
EnterCriticalSection
GlobalHandle
GlobalReAlloc
LeaveCriticalSection
LocalAlloc
InterlockedIncrement
GetTickCount
GetCurrentThread
lstrcmpA
ConvertDefaultLocale
EnumResourceLanguagesA
lstrcpyA
GlobalAlloc
FormatMessageA
LocalFree
InterlockedDecrement
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
LoadLibraryA
FreeLibrary
lstrcatA
lstrcmpW
lstrcpynA
MulDiv
GetModuleHandleA
GetProcAddress
SetLastError
GlobalLock
GlobalUnlock
GlobalFree
FreeResource
GetCurrentThreadId
CloseHandle
GetVersion
CompareStringA
lstrcmpiA
GetLastError
CompareStringW
lstrlenA
MultiByteToWideChar
GetPrivateProfileIntA
GetPrivateProfileStringA
WritePrivateProfileStringA
WideCharToMultiByte
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
CreateDirectoryA
GetLocalTime
GetModuleFileNameA
SizeofResource
LockResource
LoadResource
EnumSystemLocalesA
FindResourceA
user32
SetMenuItemBitmaps
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
RegisterWindowMessageA
WinHelpA
GetCapture
CreateWindowExA
GetClassLongA
GetClassInfoExA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SendDlgItemMessageA
GetFocus
SetFocus
IsChild
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
BeginDeferWindowPos
EndDeferWindowPos
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
MessageBoxA
TrackPopupMenu
SetScrollPos
GetScrollPos
SetForegroundWindow
GetMenu
GetSubMenu
GetMenuItemID
GetMenuItemCount
AdjustWindowRectEx
EqualRect
DeferWindowPos
GetClassInfoA
RegisterClassA
UnregisterClassA
GetDlgCtrlID
SetMenu
CallWindowProcA
SetWindowLongA
SetWindowPos
OffsetRect
IntersectRect
SystemParametersInfoA
IsIconic
GetWindowPlacement
CopyRect
PtInRect
GetWindow
EndPaint
BeginPaint
PostMessageA
EnableWindow
UpdateWindow
GetClientRect
KillTimer
SetTimer
GetDC
ReleaseDC
GetCursorPos
ScreenToClient
LoadCursorA
LoadImageA
LoadIconA
RedrawWindow
GetWindowDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
FillRect
GetDesktopWindow
SetActiveWindow
GetSystemMetrics
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetWindowLongA
GetDlgItem
IsDialogMessageA
SetWindowTextA
ShowWindow
PostQuitMessage
RegisterClipboardFormatA
IsWindowEnabled
GetParent
GetNextDlgTabItem
EndDialog
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
IsWindowVisible
GetKeyState
MapDialogRect
SetWindowContextHelpId
SetCursor
ShowOwnedPopups
TranslateAcceleratorA
GetSysColor
InflateRect
SendMessageA
GetWindowRect
InvalidateRect
CharUpperA
MoveWindow
ValidateRect
PeekMessageA
BringWindowToTop
SetRectEmpty
CreatePopupMenu
FindWindowA
MessageBeep
GetNextDlgGroupItem
InvalidateRgn
CopyAcceleratorTableA
SetRect
IsRectEmpty
PostThreadMessageA
GetMenuItemInfoA
GetSysColorBrush
CharNextA
DestroyCursor
SetCursorPos
SetCapture
wsprintfA
UnpackDDElParam
ReuseDDElParam
LoadMenuA
InsertMenuItemA
ReleaseCapture
DefWindowProcA
LoadAcceleratorsA
DestroyMenu
gdi32
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
ExtSelectClipRgn
DeleteDC
CreatePatternBrush
CreateBitmap
CreateCompatibleDC
GetStockObject
GetDeviceCaps
CreatePen
Escape
CreateCompatibleBitmap
PatBlt
CreateFontIndirectA
CreateRectRgnIndirect
GetMapMode
GetBkColor
GetTextColor
SetViewportOrgEx
GetRgnBox
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetPixel
GetWindowExtEx
GetViewportExtEx
GetObjectA
DeleteObject
GetClipBox
SetMapMode
GetTextExtentPoint32A
SelectObject
SetTextColor
SetStretchBltMode
SetBkMode
SetBkColor
CreateSolidBrush
SetPixel
StretchBlt
SetDIBits
GetDIBits
GetCurrentObject
SetBrushOrgEx
Rectangle
CreateDIBSection
SaveDC
BitBlt
RestoreDC
comdlg32
GetFileTitleA
GetOpenFileNameA
GetSaveFileNameA
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegOpenKeyA
RegDeleteKeyA
RegEnumKeyA
RegCreateKeyExA
RegSetValueExA
RegQueryValueA
shell32
DragFinish
DragQueryFileA
ShellExecuteA
comctl32
ImageList_GetImageInfo
ImageList_Draw
ord17
ImageList_Destroy
shlwapi
PathFindFileNameA
PathStripToRootA
PathFindExtensionA
PathIsUNCA
oledlg
ord8
ole32
CoGetClassObject
CoRevokeClassObject
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
CoTaskMemFree
CLSIDFromString
CLSIDFromProgID
OleInitialize
CoFreeUnusedLibraries
OleUninitialize
CoTaskMemAlloc
CreateILockBytesOnHGlobal
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
oleaut32
OleCreateFontIndirect
SysAllocStringByteLen
SysStringLen
VariantChangeType
SysFreeString
SysAllocStringLen
VariantClear
VariantInit
VariantCopy
SafeArrayDestroy
VariantTimeToSystemTime
SystemTimeToVariantTime
SysAllocString
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
client_io
??0io_proxy@@QAE@PBDK@Z
?is_valid@io_proxy@@QBE_NXZ
?send_packet@io_proxy@@QAEXPADII@Z
?add_xy_handler@io_proxy@@QAEXPAV?$protocol_handler@Vio_proxy@@@@@Z
?close@io_proxy@@QAEXXZ
?alloc_packet@io_proxy@@QAEPADPAX@Z
?alloc_size@io_proxy@@QBEIPAX@Z
?choose_allocator@io_proxy@@QAEPAXI@Z
?is_connected@io_proxy@@QBE_NXZ
?connect@io_proxy@@QAEXXZ
?release_packet@io_proxy@@QAEXPAD@Z
??1io_proxy@@UAE@XZ
dsound
ord1
chat
?set_self_id@chat@@QAEXI@Z
?add_msg@chat@@QAEXPBDW4msg_type@1@@Z
?handle_protocol@chat@@QAE_NAAVio_proxy@@IAAVbistream@@@Z
??0chat@@QAE@PAVio_proxy@@PAVplayer_list@@@Z
??1chat@@UAE@XZ
?enable_sound@chat@@QAEX_N@Z
?create@chat@@QAE_NPAUHWND__@@I@Z
player_list
?hwnd@player_list@@QBEPAUHWND__@@XZ
?create@player_list@@QAE_NPAUHWND__@@I@Z
?set_visible@player_list@@QAEXW4player_list_column@@_N@Z
?remove_player@player_list@@QAEXI@Z
?add_player@player_list@@QAEXPBV?$player_t@Vio_proxy@@@@@Z
?get_player@player_list@@QAEPAV?$player_t@Vio_proxy@@@@I@Z
??1player_list@@UAE@XZ
??0player_list@@QAE@PAVio_proxy@@PAVchat@@@Z
?handle_protocol@player_list@@QAE_NAAVio_proxy@@IAAVbistream@@@Z
?set_self_id@player_list@@QAEXI@Z
msimg32
AlphaBlend
TransparentBlt
Sections
.text Size: 492KB - Virtual size: 491KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 124KB - Virtual size: 121KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 60KB - Virtual size: 59KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ