?COMWndProc@@YGJPAUHWND__@@IIJ@Z
Static task
static1
Behavioral task
behavioral1
Sample
d7767cbbe533aa90f5617a24a79ca161269667292ad20421371b761a39672769.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d7767cbbe533aa90f5617a24a79ca161269667292ad20421371b761a39672769.exe
Resource
win10v2004-20220812-en
General
-
Target
d7767cbbe533aa90f5617a24a79ca161269667292ad20421371b761a39672769
-
Size
1.2MB
-
MD5
9332e838d561d0569908790894e05ff6
-
SHA1
7d680ad60d420fe3f3e38ce0a703227cd654eb9a
-
SHA256
d7767cbbe533aa90f5617a24a79ca161269667292ad20421371b761a39672769
-
SHA512
c63122c328a6db77f0254d6d35ff8fa2e00f4e67b1545be75692889d47798384131efb2e9aebbe5b8df7ece1ffbb17e5883fe36a503e443eea39ab5714997dea
-
SSDEEP
12288:now8Ye9qRsXLaAVUIeHJ/CIlvzCFK/YOw6SGOg5BSCi7ws6zYrillHsHBtaI:yLmQb2OgfSDcXmTta
Malware Config
Signatures
Files
-
d7767cbbe533aa90f5617a24a79ca161269667292ad20421371b761a39672769.exe windows x86
1720adf88a3a205aba3b3767a144ba8d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
hpqtap08
TAPASLinkEx
version
GetFileVersionInfoSizeA
VerQueryValueA
GetFileVersionInfoA
kernel32
InitializeCriticalSection
DeleteCriticalSection
SetLastError
FindResourceExA
FormatMessageA
CreateFileA
OutputDebugStringA
WriteFile
QueryPerformanceFrequency
QueryPerformanceCounter
GetFileSize
GetUserDefaultLangID
GetSystemDefaultLangID
LocalFree
GetLocaleInfoA
GetTempPathA
GetEnvironmentVariableA
GetShortPathNameA
GetSystemDirectoryA
Sleep
GetDriveTypeA
DeleteFileA
lstrcmpA
WritePrivateProfileStringA
CompareFileTime
GetFileTime
HeapAlloc
GetProcessHeap
HeapFree
CreateDirectoryA
TerminateProcess
WaitForSingleObject
GetExitCodeProcess
CreateProcessA
GetStartupInfoA
CreateMutexA
OpenMutexA
SetFilePointer
RaiseException
GetComputerNameA
HeapDestroy
HeapReAlloc
HeapSize
MultiByteToWideChar
LeaveCriticalSection
EnterCriticalSection
GetModuleHandleA
GetLastError
GetGeoInfoA
GetUserGeoID
EnumSystemGeoID
GetUserDefaultLCID
WideCharToMultiByte
lstrlenW
GetCommandLineA
GetVersionExA
GetWindowsDirectoryA
FindClose
FindNextFileA
GetPrivateProfileStringA
GetFileAttributesA
GetCurrentDirectoryA
SetCurrentDirectoryA
lstrlenA
FindResourceA
LoadResource
LockResource
SizeofResource
InterlockedExchange
InterlockedCompareExchange
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCurrentProcessId
GetSystemTimeAsFileTime
FindFirstFileA
GetFullPathNameA
CloseHandle
GetTimeFormatA
GetDateFormatA
GetLocalTime
CreateEventA
CreateThread
GetModuleFileNameA
GetTickCount
GetCurrentThreadId
GlobalDeleteAtom
LoadLibraryA
FreeLibrary
GetCurrentProcess
GetProcAddress
MulDiv
user32
PtInRect
SetRectEmpty
InflateRect
DrawFocusRect
GetClientRect
ScreenToClient
SetTimer
KillTimer
GetParent
IsWindow
GetMessagePos
SetCursor
GetSysColor
CopyIcon
LoadCursorA
DestroyCursor
MessageBoxA
GetSystemMetrics
EnableWindow
SetWindowTextA
GetWindowThreadProcessId
PostQuitMessage
MsgWaitForMultipleObjects
WaitForInputIdle
DefWindowProcA
ShowWindow
SetForegroundWindow
AttachThreadInput
GetForegroundWindow
GetDesktopWindow
IsIconic
LoadBitmapA
GetWindowLongA
GetDC
LoadIconA
RedrawWindow
SendMessageA
TabbedTextOutA
DrawTextA
DrawTextExA
GrayStringA
InvalidateRect
GetDlgItem
wsprintfA
GetWindowRect
IsWindowVisible
DispatchMessageA
TranslateMessage
SetWindowLongA
ReleaseDC
PeekMessageA
advapi32
RegSetValueExA
RegCreateKeyExA
RegOpenKeyExA
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegQueryValueExA
ole32
CoInitializeEx
CoInitialize
CoUninitialize
CoCreateInstance
shell32
SHGetFolderPathA
ShellExecuteA
SHGetPathFromIDListA
SHGetMalloc
SHBrowseForFolderA
ShellExecuteExA
SHGetFolderPathAndSubDirA
oleaut32
SysAllocString
VarBstrCat
VariantClear
CreateErrorInfo
SetErrorInfo
OleLoadPicturePath
SysStringByteLen
SysAllocStringByteLen
SysStringLen
SysAllocStringLen
SysFreeString
shlwapi
PathRemoveFileSpecA
msvcr90
strstr
_controlfp_s
_invoke_watson
_crt_debugger_hook
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_except_handler4_common
?terminate@@YAXXZ
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
exit
_XcptFilter
_exit
_cexit
__getmainargs
_amsg_exit
_decode_pointer
_onexit
_encode_pointer
__dllonexit
_unlock
strcpy
_setmbcp
_itoa
_mbschr
strtoul
_mbsupr_s
fopen_s
fclose
fgets
feof
_ismbcspace
_mbslwr_s
_mbsdec
_ismbblead
_mbsstr
wcsncpy_s
_mbsrchr
_lock
memmove
atol
??3@YAXPAX@Z
free
_CxxThrowException
__CxxFrameHandler3
_mbsnbcpy_s
memcpy_s
memmove_s
vsprintf_s
sprintf_s
sprintf
memset
??0exception@std@@QAE@ABQBD@Z
?what@exception@std@@UBEPBDXZ
??1exception@std@@UAE@XZ
??0exception@std@@QAE@XZ
_invalid_parameter_noinfo
??2@YAPAXI@Z
??0exception@std@@QAE@ABV01@@Z
_mbsnbcpy
_mbscmp
_mbsicmp
_mbsnbicmp
_mbsinc
??_V@YAXPAX@Z
strcpy_s
_access
_mbstok_s
_mbsninc
_mbctoupper
strcat_s
__argv
__argc
atoi
??_U@YAPAXI@Z
_purecall
strlen
strftime
_localtime64_s
_time64
mfc90
ord2368
ord2375
ord2625
ord2607
ord2605
ord2623
ord2635
ord2612
ord2628
ord2633
ord2616
ord2618
ord2620
ord2614
ord2630
ord2610
ord969
ord965
ord967
ord963
ord958
ord5666
ord5668
ord6446
ord1729
ord4688
ord5139
ord3732
ord5636
ord4589
ord6780
ord5497
ord2074
ord5585
ord4650
ord1496
ord4331
ord1752
ord1755
ord6388
ord3344
ord1678
ord1809
ord1810
ord5309
ord5152
ord4617
ord5615
ord1137
ord1108
ord2208
ord6559
ord3534
ord1183
ord2539
ord2106
ord3477
ord595
ord4667
ord3277
ord5647
ord4638
ord1497
ord6391
ord3346
ord1668
ord611
ord3478
ord2273
ord6587
ord6615
ord4412
ord586
ord789
ord1358
ord1357
ord6074
ord636
ord2470
ord6554
ord6352
ord367
ord3504
ord6157
ord6398
ord5833
ord5846
ord6023
ord5957
ord6084
ord6079
ord6166
ord6527
ord6549
ord4565
ord6546
ord6043
ord6552
ord6046
ord2753
ord310
ord6170
ord4513
ord744
ord524
ord1045
ord2356
ord782
ord945
ord4431
ord581
ord3487
ord4640
ord1670
ord2277
ord4496
ord1604
ord2103
ord615
ord1938
ord1603
ord3528
ord3479
ord2327
ord5924
ord6584
ord2097
ord3755
ord4030
ord1252
ord1144
ord2592
ord4029
ord1611
ord305
ord3213
ord941
ord1041
ord4477
ord306
ord819
ord1065
ord1098
ord2481
ord4481
ord301
ord3659
ord4890
ord3110
ord5646
ord5663
ord4981
ord4333
ord5659
ord5657
ord3209
ord2087
ord4199
ord5813
ord6721
ord5533
ord1046
ord4165
ord6018
ord2206
ord2251
ord4733
ord6781
ord4159
ord6783
ord4409
ord4434
ord400
ord3525
ord2948
ord2950
ord5926
ord4529
ord3629
ord766
ord6048
ord4507
ord5997
ord4392
ord663
ord403
ord579
ord2447
ord1155
ord2141
ord793
ord4197
ord6001
ord589
ord2588
ord639
ord376
ord1490
ord6557
ord4202
ord5167
ord4727
ord4760
ord2143
ord3987
ord333
ord4993
ord4116
ord4384
ord2587
ord2069
ord3643
ord4646
ord1720
ord2283
ord777
ord2896
ord3730
ord1536
ord613
ord337
ord1644
ord6784
ord4160
ord6782
ord3671
ord5389
ord6356
ord3218
ord1446
ord5608
ord2139
ord1792
ord1791
ord1728
ord5633
ord2766
ord2978
ord3107
ord4714
ord2961
ord3135
ord2769
ord2888
ord2759
ord4066
ord4067
ord4057
ord2886
ord4334
ord4895
ord4668
ord3506
ord820
ord300
ord316
ord2691
ord5835
ord1387
ord2899
ord2360
ord2372
ord817
ord6740
ord2364
ord2057
ord1918
ord601
ord1276
gdi32
StretchBlt
CreateFontA
GetLayout
SetLayout
GetDeviceCaps
GetPixel
CreateBitmap
CreateCompatibleBitmap
GetStockObject
GetObjectA
CreateFontIndirectA
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
BitBlt
GetWindowExtEx
GetViewportExtEx
GetMapMode
GetBkColor
CreateCompatibleDC
msvcp90
?assign@?$char_traits@D@std@@SAPADPADID@Z
?length@?$char_traits@D@std@@SAIPBD@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
?_Xlen@_String_base@std@@SAXXZ
?allocate@?$allocator@D@std@@QAEPADI@Z
?_Xran@_String_base@std@@SAXXZ
?deallocate@?$allocator@D@std@@QAEXPADI@Z
Exports
Exports
Sections
.text Size: 279KB - Virtual size: 279KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 84KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 614KB - Virtual size: 614KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 38KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.vmp0 Size: 192KB - Virtual size: 1.3MB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE