Static task
static1
Behavioral task
behavioral1
Sample
169f1c721e463daec3c41dfe6e49645272db6d02492d3209c95af4ba48c620d5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
169f1c721e463daec3c41dfe6e49645272db6d02492d3209c95af4ba48c620d5.exe
Resource
win10v2004-20220812-en
General
-
Target
169f1c721e463daec3c41dfe6e49645272db6d02492d3209c95af4ba48c620d5
-
Size
1.3MB
-
MD5
dfa6e90089f1de5e06c188e567bd6c3d
-
SHA1
cbd18346cc50f59e6a5ea35b17162e8ca7af822c
-
SHA256
169f1c721e463daec3c41dfe6e49645272db6d02492d3209c95af4ba48c620d5
-
SHA512
2ada71921f2bedd1168217be2526fa445d87bf70589ca4380a2634adb75dc20f20048842fc5a8a092ed71bd79695b42ecb0d7819d37ac9422f13f93c9aa5d9a0
-
SSDEEP
24576:WoHriPtBylLE9meDiGGJcf+lx1Tp5Zm2uZWJu8Hxko7/5XvkwrBy:tmBD0Jy+lx1TpCl4Hx5RkgB
Malware Config
Signatures
Files
-
169f1c721e463daec3c41dfe6e49645272db6d02492d3209c95af4ba48c620d5.exe windows x86
cf062c59c145831833830b6ecf5248d2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
ws2_32
inet_ntoa
ndsound
_DXSetSoundVolume@4
dinput8
DirectInput8Create
roleview
RoleViewCreate
graphic
?ShowString@CMyBitmap@@SAXHHKPBD0HH@Z
gamedata
RoleDataQueryEx
role3d
Simple3DObjCreate
graphicdata
GameDataSetDestroy
wininet
InternetOpenUrlA
chat
ChaterInfoMgrQuery
assist
?CreateMonitorManager@@YAXXZ
imm32
ImmSetCompositionWindow
tqpackage
?TqFGetVersion@@YAJXZ
mfc42
ord5277
msvcrt
_adjust_fdiv
user32
EnumChildWindows
gdi32
CreateRectRgn
advapi32
AllocateAndInitializeSid
shell32
ShellExecuteA
ole32
CreateStreamOnHGlobal
olepro32
ord251
oleaut32
VariantClear
msvcp60
?append@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
winmm
timeGetTime
Sections
.text Size: 1.3MB - Virtual size: 6.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 25KB - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE