Static task
static1
Behavioral task
behavioral1
Sample
0ef194ef9ed903da14ce306afdfbb4514bedbd545159b9b1a77d7e0cc4c2cce4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0ef194ef9ed903da14ce306afdfbb4514bedbd545159b9b1a77d7e0cc4c2cce4.exe
Resource
win10v2004-20220812-en
General
-
Target
0ef194ef9ed903da14ce306afdfbb4514bedbd545159b9b1a77d7e0cc4c2cce4
-
Size
1.3MB
-
MD5
6748fabb6131ce6d5e2a3272d074647b
-
SHA1
d5c9a4939cb2789131100f5a2b2a2ccc7e1fa3ac
-
SHA256
0ef194ef9ed903da14ce306afdfbb4514bedbd545159b9b1a77d7e0cc4c2cce4
-
SHA512
988c65e17fbf57de202b83dbf33f638a3684d715b699abf4710da7833e6d9cd239bf897479b5108cba2a6ede7fa3e6301b0073a30b75977e13590fad06ac8cf6
-
SSDEEP
24576:XoHriPtBylLE9meDiGGJcf+lx1Tp5Zm2uZWJu8Hxko7/5XvkwrBy:amBD0Jy+lx1TpCl4Hx5RkgB
Malware Config
Signatures
Files
-
0ef194ef9ed903da14ce306afdfbb4514bedbd545159b9b1a77d7e0cc4c2cce4.exe windows x86
cf062c59c145831833830b6ecf5248d2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
ws2_32
inet_ntoa
ndsound
_DXSetSoundVolume@4
dinput8
DirectInput8Create
roleview
RoleViewCreate
graphic
?ShowString@CMyBitmap@@SAXHHKPBD0HH@Z
gamedata
RoleDataQueryEx
role3d
Simple3DObjCreate
graphicdata
GameDataSetDestroy
wininet
InternetOpenUrlA
chat
ChaterInfoMgrQuery
assist
?CreateMonitorManager@@YAXXZ
imm32
ImmSetCompositionWindow
tqpackage
?TqFGetVersion@@YAJXZ
mfc42
ord5277
msvcrt
_adjust_fdiv
user32
EnumChildWindows
gdi32
CreateRectRgn
advapi32
AllocateAndInitializeSid
shell32
ShellExecuteA
ole32
CreateStreamOnHGlobal
olepro32
ord251
oleaut32
VariantClear
msvcp60
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
winmm
timeGetTime
Sections
.text Size: 1.3MB - Virtual size: 6.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 25KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE