Static task
static1
Behavioral task
behavioral1
Sample
a6b8ac057b7127b434c4bf4ed26acd16dd5a855bf4080876f7b39c14db4d46b8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a6b8ac057b7127b434c4bf4ed26acd16dd5a855bf4080876f7b39c14db4d46b8.exe
Resource
win10v2004-20220812-en
General
-
Target
a6b8ac057b7127b434c4bf4ed26acd16dd5a855bf4080876f7b39c14db4d46b8
-
Size
144KB
-
MD5
8191520840500719e2d4f6336ffec55a
-
SHA1
94c4c4781cd6f9f972e5def48d9958d5daf0e738
-
SHA256
a6b8ac057b7127b434c4bf4ed26acd16dd5a855bf4080876f7b39c14db4d46b8
-
SHA512
c6486935bd022ca8833dc67cafe649750d40645c7f7c07982f668499795dc513e7fd811a3b09b3375d86ae63fe931fa62a30db31da42f5996d0d3688bf684277
-
SSDEEP
3072:xcba7mon3RAs7IFO8fPOEzNvUBPX8acC2+ZUqsy9AlQ2Qo:Conys7IIwPO0NsfcC2kEeo
Malware Config
Signatures
Files
-
a6b8ac057b7127b434c4bf4ed26acd16dd5a855bf4080876f7b39c14db4d46b8.exe windows x86
439adade71722c00918bb5c4a6839575
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
yui
?GetLayoutEngine@yui@@YAPAVILayoutEngine@1@XZ
advapi32
RegDeleteValueW
RegCreateKeyExW
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
RegSetValueExW
RegDeleteKeyW
RegQueryInfoKeyW
RegEnumKeyExW
kernel32
MultiByteToWideChar
lstrlenA
GetPrivateProfileStringW
GetModuleFileNameW
lstrcpynW
WideCharToMultiByte
lstrlenW
GetVersionExW
RaiseException
EnterCriticalSection
LeaveCriticalSection
FlushInstructionCache
GetCurrentProcess
GetCurrentThreadId
SetLastError
InitializeCriticalSection
DeleteCriticalSection
GetTimeFormatW
GlobalAddAtomW
GlobalDeleteAtom
ReleaseMutex
InterlockedIncrement
FindResourceExW
lstrcmpiW
CloseHandle
FreeLibrary
LoadLibraryExW
GetModuleHandleW
LoadLibraryW
WaitForSingleObject
GetCommandLineW
CreateMutexW
WinExec
GetStartupInfoA
Sleep
VirtualAlloc
VirtualFree
IsProcessorFeaturePresent
LoadLibraryA
GetProcAddress
InterlockedCompareExchange
GetProcessHeap
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
HeapDestroy
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
SetUnhandledExceptionFilter
IsDebuggerPresent
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
FindResourceW
LoadResource
LockResource
SizeofResource
GetLastError
GetSystemTimeAsFileTime
InterlockedDecrement
UnhandledExceptionFilter
TerminateProcess
user32
EndDialog
RegisterClassW
LoadCursorW
DefWindowProcW
BeginPaint
DestroyWindow
IsWindow
CreateDialogParamW
DialogBoxParamW
GetActiveWindow
SetForegroundWindow
MoveWindow
GetClientRect
UnregisterClassA
SetMenuDefaultItem
GetCursorPos
TrackPopupMenu
CreateWindowExW
GetSysColor
TranslateMessage
DispatchMessageW
IsDialogMessageW
LoadImageW
RegisterClassExW
CallWindowProcW
PostQuitMessage
GetClassInfoExW
PostMessageW
UnregisterHotKey
RegisterHotKey
ScreenToClient
RedrawWindow
SetTimer
KillTimer
SetFocus
LoadMenuW
GetMenuItemCount
GetMenuStringW
GetSubMenu
LoadStringW
GetMessageW
FillRect
DrawTextW
EndPaint
CharNextW
SetMenuItemInfoW
GetDesktopWindow
GetWindowLongW
GetWindowRect
GetDC
ReleaseDC
SetWindowPos
SetWindowTextW
EnableWindow
ShowWindow
GetDlgItem
GetParent
SendDlgItemMessageW
SendMessageW
SetWindowLongW
DestroyMenu
RegisterWindowMessageW
gdi32
GetDeviceCaps
CreateSolidBrush
SetBkColor
SelectObject
SetBkMode
SetTextColor
DeleteObject
shell32
Shell_NotifyIconW
ole32
CoTaskMemFree
CoCreateInstance
CoTaskMemRealloc
CoTaskMemAlloc
oleaut32
VarUI4FromStr
shlwapi
PathRemoveFileSpecW
msvcp80
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@PB_W@Z
??Y?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV01@PB_W@Z
??0?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@XZ
??1?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAE@XZ
?c_str@?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QBEPB_WXZ
??4?$basic_string@_WU?$char_traits@_W@std@@V?$allocator@_W@2@@std@@QAEAAV01@PB_W@Z
msvcr80
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_amsg_exit
_except_handler4_common
_decode_pointer
_onexit
_lock
_encode_pointer
__dllonexit
_unlock
?terminate@@YAXXZ
wcsncpy_s
malloc
swprintf_s
srand
rand
_initterm_e
wcscpy_s
_wcsicmp
wcsncat
_wtoi
vswprintf_s
_vscwprintf
memset
??_V@YAXPAX@Z
wcsrchr
wcsstr
__CxxFrameHandler3
_recalloc
calloc
free
memmove_s
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_CxxThrowException
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
_invoke_watson
??2@YAPAXI@Z
??3@YAXPAX@Z
memcpy_s
_controlfp_s
Sections
.text Size: 44KB - Virtual size: 42KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.yrdata Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE