Static task
static1
Behavioral task
behavioral1
Sample
a623e7a8222eba734bf16b8e9c32af10cf246e8fe1d52cc0632e2dd5fe9b9208.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a623e7a8222eba734bf16b8e9c32af10cf246e8fe1d52cc0632e2dd5fe9b9208.exe
Resource
win10v2004-20221111-en
General
-
Target
a623e7a8222eba734bf16b8e9c32af10cf246e8fe1d52cc0632e2dd5fe9b9208
-
Size
186KB
-
MD5
5306191788019e180bdda273bc1d2d54
-
SHA1
8c975ba836baef93b1a8e79b48cc1642ab2aa0d3
-
SHA256
a623e7a8222eba734bf16b8e9c32af10cf246e8fe1d52cc0632e2dd5fe9b9208
-
SHA512
2f5c98ff229e776861dc6691b79dddc56df45ce80ae21c5d2f20a2563bb2fedc82a71cdf295e8c80e23556997182c16c7cad8a630892b4d6c0c460fd6b4e8644
-
SSDEEP
3072:vmKebu4NAJgw8NHCImLgYevku87+QaEOTK9wQjhtzsJ3tYVOZcr3jWdr3j+VutBy:vmKebu4NAJD8NHCImLgYevku870EOTK5
Malware Config
Signatures
Files
-
a623e7a8222eba734bf16b8e9c32af10cf246e8fe1d52cc0632e2dd5fe9b9208.exe windows x86
00b2f1844c6ad90d579217d01144f9bc
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
skincontrols
?IsNull@CPngImage@@QAE_NXZ
?LoadImageA@CPngImage@@QAE_NPBD@Z
?GetImage@CPngImage@@QAEPAVImage@Gdiplus@@XZ
?DrawImage@CPngImage@@QAE_NPAVCDC@@HHHHHHHH@Z
?SetButtonImage@CSkinButton@@QAE_NPBD_N@Z
??0CSkinButton@@QAE@XZ
??0CPngImage@@QAE@XZ
??1CSkinButton@@UAE@XZ
?DrawImage@CPngImage@@QAE_NPAVCDC@@HH@Z
??1CPngImage@@UAE@XZ
mfc90
ord399
ord2949
ord553
ord3620
ord757
ord2587
ord6152
ord3800
ord3397
ord3008
ord3015
ord3012
ord2315
ord6339
ord4451
ord6712
ord949
ord2525
ord2694
ord6637
ord6074
ord1357
ord1358
ord1183
ord3534
ord3477
ord6613
ord3213
ord305
ord1611
ord300
ord441
ord5544
ord2084
ord1559
ord3178
ord690
ord6640
ord5997
ord3726
ord4727
ord2896
ord4895
ord1603
ord816
ord2469
ord524
ord744
ord2470
ord367
ord6170
ord2106
ord2097
ord636
ord2698
ord5835
ord5963
ord4392
ord817
ord945
ord3414
ord4529
ord310
ord820
ord6584
ord6557
ord5615
ord4617
ord5152
ord5309
ord2208
ord1810
ord1809
ord1678
ord3344
ord6388
ord1755
ord1752
ord4331
ord1496
ord4650
ord2074
ord5497
ord6780
ord4589
ord5636
ord3732
ord5139
ord4688
ord1729
ord6446
ord5668
ord5666
ord3799
ord963
ord967
ord965
ord969
ord2610
ord2630
ord2614
ord2620
ord2618
ord2616
ord2633
ord2628
ord2612
ord2635
ord2623
ord2605
ord2607
ord2625
ord2375
ord2368
ord1644
ord6784
ord4160
ord6782
ord3671
ord5389
ord6356
ord3218
ord1446
ord5608
ord2139
ord1792
ord1791
ord1728
ord5633
ord4668
ord2337
ord3783
ord3946
ord3978
ord1137
ord798
ord2447
ord4197
ord1098
ord316
ord2539
ord910
ord1303
ord601
ord793
ord4434
ord4409
ord5852
ord5916
ord1583
ord3179
ord5753
ord6681
ord6503
ord406
ord2490
ord665
ord2501
ord6675
ord554
ord758
ord2691
ord2484
ord5877
ord1039
ord4145
ord1258
ord4281
ord5307
ord2274
ord1668
ord4638
ord3480
ord611
ord941
ord1166
ord403
ord6048
ord1062
ord3506
ord5750
ord1247
ord5926
ord2950
ord6783
ord4159
ord6781
ord4733
ord2251
ord2206
ord6018
ord4165
ord1046
ord5533
ord6721
ord5813
ord4199
ord2087
ord3209
ord5657
ord5659
ord4333
ord4981
ord5663
ord5646
ord6001
ord2766
ord2978
ord3107
ord4714
ord2961
ord3110
ord2769
ord2888
ord2759
ord4066
ord4067
ord4057
ord2886
ord4334
ord4890
ord4667
ord2948
ord3525
ord400
ord6791
ord1254
ord265
ord6802
ord5761
ord1252
ord3579
ord4506
ord4507
ord404
ord5716
ord5520
ord6793
ord1555
ord663
ord2672
ord1334
ord3627
ord1144
ord2364
ord5167
ord3987
ord4993
ord374
ord639
ord3940
ord796
ord1746
ord3346
ord6391
ord1497
ord5585
ord5647
ord3135
ord3277
ord3659
ord589
ord4952
ord4029
ord800
ord595
ord266
ord1108
ord958
ord2069
ord6493
ord1276
msvcr90
_getcwd
_chdir
_splitpath
memcmp
sprintf_s
_setmbcp
strcpy_s
memcpy_s
?what@exception@std@@UBEPBDXZ
??0exception@std@@QAE@ABQBD@Z
_vsnprintf_s
??0exception@std@@QAE@XZ
??1exception@std@@UAE@XZ
??0exception@std@@QAE@ABV01@@Z
malloc
_mktime64
memcpy
_invalid_parameter_noinfo
strcmp
strlen
strcat
_CxxThrowException
_time64
_purecall
memset
__CxxFrameHandler3
free
memmove_s
_controlfp_s
_invoke_watson
_except_handler4_common
_crt_debugger_hook
?_type_info_dtor_internal_method@type_info@@QAEXXZ
?terminate@@YAXXZ
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_configthreadlocale
_initterm_e
_initterm
_acmdln
exit
_ismbblead
_XcptFilter
_exit
_cexit
__getmainargs
_amsg_exit
_stricmp
_decode_pointer
_onexit
_lock
_encode_pointer
__dllonexit
_unlock
calloc
memmove
_strdup
kernel32
lstrlenA
InterlockedDecrement
CreateDirectoryA
InitializeCriticalSection
DeleteCriticalSection
CloseHandle
CreateEventA
EnterCriticalSection
LeaveCriticalSection
SetEvent
HeapFree
GetProcessHeap
MultiByteToWideChar
CreateThread
WaitForSingleObject
DeleteFileA
GetTickCount
GetCurrentProcessId
GetCurrentThreadId
GetProcAddress
GetModuleHandleA
CreateFileA
FlushFileBuffers
WriteFile
FreeResource
GetLastError
GetPrivateProfileIntA
LockResource
LoadResource
GetCurrentDirectoryA
GetLocalTime
GetPrivateProfileStringA
WritePrivateProfileStringA
WinExec
CreateProcessA
SetCurrentDirectoryA
OutputDebugStringA
GetModuleFileNameA
MoveFileExA
GetSystemTimeAsFileTime
QueryPerformanceCounter
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetStartupInfoA
InterlockedCompareExchange
Sleep
InterlockedExchange
SetFilePointer
UnmapViewOfFile
CreateFileMappingA
MapViewOfFile
SetVolumeLabelA
GetDiskFreeSpaceA
SetFileAttributesA
GetDriveTypeA
GlobalAlloc
GlobalLock
GlobalUnlock
FindResourceA
SizeofResource
GetFileAttributesA
user32
GetDesktopWindow
FindWindowA
GetSystemMetrics
DrawIcon
SendMessageA
PostMessageA
IsIconic
BringWindowToTop
GetClientRect
ClientToScreen
GetDC
UpdateWindow
InvalidateRect
SetTimer
KillTimer
EnableWindow
LoadIconA
SetWindowRgn
SetWindowLongA
GetWindowLongA
SetWindowPos
IsWindow
ShowWindow
UnregisterClassA
DestroyWindow
CreateWindowExA
RegisterClassExA
LoadCursorA
DefWindowProcA
GetWindow
CallWindowProcA
ScreenToClient
GetParent
SetPropA
GetPropA
RemovePropA
IsWindowVisible
GetTopWindow
LoadBitmapA
OemToCharBuffA
CharToOemBuffA
GetWindowRect
gdi32
CreateCompatibleDC
BitBlt
CreateRectRgn
CreateCompatibleBitmap
DeleteObject
SelectObject
CreateDIBSection
DeleteDC
GetStockObject
CreateSolidBrush
shell32
ShellExecuteA
comctl32
InitCommonControlsEx
shlwapi
PathFileExistsA
PathFindFileNameA
PathAddBackslashA
PathRemoveExtensionA
PathAddExtensionA
PathRemoveFileSpecA
PathIsDirectoryA
ole32
CreateStreamOnHGlobal
CoCreateInstance
OleRun
CLSIDFromString
CLSIDFromProgID
CoUninitialize
CoInitialize
oleaut32
SysAllocStringLen
SysFreeString
VariantClear
VariantChangeType
VariantCopy
VariantInit
SysAllocString
GetErrorInfo
gdiplus
GdipDeleteBrush
GdipCloneBrush
GdipFree
GdipAlloc
GdipCreateStringFormat
GdipDeleteStringFormat
GdipSetStringFormatAlign
GdipSetStringFormatLineAlign
GdipSetTextRenderingHint
GdipDrawString
GdipDrawImageRectRect
GdipCreateFontFamilyFromName
GdipDeleteFontFamily
GdipCreateFont
GdipDeleteFont
GdipGetImageWidth
GdipGetImageHeight
GdipCreateSolidFill
GdipCreatePen1
GdipDeletePen
GdipCreateFromHDC
GdipDeleteGraphics
GdipSetSmoothingMode
GdipDrawLineI
GdipFillRectangleI
GdipDrawImageI
GdipDrawImageRectI
GdipLoadImageFromFile
GdipLoadImageFromFileICM
GdipDisposeImage
GdipCloneImage
GdipCreateBitmapFromHBITMAP
GdipLoadImageFromStream
GdipLoadImageFromStreamICM
GdiplusShutdown
GdipCreateTexture
GdiplusStartup
msvcp90
?c_str@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEPBDXZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
ws2_32
gethostbyname
WSAStartup
imagehlp
MakeSureDirectoryPathExists
Sections
.text Size: 130KB - Virtual size: 129KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 35KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ