?GenericOutputInfoYSUh@@YGK_KHE[D
Static task
static1
Behavioral task
behavioral1
Sample
cbbee4fbd3ef2bfbd8220330af06fb264d4f2e82acd114a5c84211c15ca09375.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
cbbee4fbd3ef2bfbd8220330af06fb264d4f2e82acd114a5c84211c15ca09375.exe
Resource
win10v2004-20221111-en
General
-
Target
cbbee4fbd3ef2bfbd8220330af06fb264d4f2e82acd114a5c84211c15ca09375
-
Size
204KB
-
MD5
ed63e03109ccf8a6afd1844317e8f566
-
SHA1
574a1a5df70ea595c6d7e5b08a5e228942729eea
-
SHA256
cbbee4fbd3ef2bfbd8220330af06fb264d4f2e82acd114a5c84211c15ca09375
-
SHA512
a2041b9613565a984a7609e4b5b543af5d914c541da7ef4d4d4f373cb2b487a24cbc1f6534da4275dafb8ec626c0b7105a196b956459e6f170f1d601c9b7c1e9
-
SSDEEP
6144:5HkX2mDKfV0XjxWCBliDdzQCvzQV/vYadtv8Kj+QZ8:5HO5DSuXjxWUA9Zc5Aaf55Z
Malware Config
Signatures
Files
-
cbbee4fbd3ef2bfbd8220330af06fb264d4f2e82acd114a5c84211c15ca09375.exe windows x86
8ce2d4ea05e414e5b2181fae944e0ad2
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
TileWindows
GetMenuStringW
CharPrevA
IsCharAlphaNumericW
GetCursorPos
ModifyMenuW
SetMenu
CharLowerA
RegisterClassExA
IsDialogMessageW
CreatePopupMenu
GetSysColorBrush
InvalidateRgn
GetParent
SetCaretPos
DestroyAcceleratorTable
DestroyMenu
CopyRect
VkKeyScanW
CreateCursor
FillRect
SendMessageA
SetWindowTextA
AppendMenuA
CopyAcceleratorTableW
SetCursor
DeleteMenu
mouse_event
LoadCursorW
GetWindowTextW
ClientToScreen
FindWindowA
CopyImage
GetMenuStringA
CreateWindowExW
GetFocus
WindowFromPoint
IsWindowVisible
MonitorFromPoint
SetCursorPos
GetKeyboardLayoutList
ToUnicodeEx
CheckMenuRadioItem
CharUpperBuffW
GetSysColor
RegisterWindowMessageW
keybd_event
ChildWindowFromPoint
GetCaretPos
GetWindowPlacement
WaitMessage
LookupIconIdFromDirectory
UnloadKeyboardLayout
SetParent
SetForegroundWindow
GetForegroundWindow
GetCaretBlinkTime
ShowOwnedPopups
ChangeMenuW
RegisterClassW
MapVirtualKeyA
SendMessageTimeoutW
GetSystemMetrics
OffsetRect
CreateMenu
ActivateKeyboardLayout
SetScrollRange
IsCharLowerA
GetWindowLongW
SendDlgItemMessageW
GetMonitorInfoW
GetWindowDC
GetSystemMenu
GetWindowLongA
GetActiveWindow
InternalGetWindowText
GetClientRect
TrackPopupMenuEx
SetMenuItemBitmaps
PeekMessageA
ExitWindowsEx
GetLastActivePopup
DefDlgProcA
GetMessageTime
SetActiveWindow
GetUpdateRect
DrawTextExW
CharLowerW
DrawStateW
SetFocus
ClipCursor
DestroyIcon
IntersectRect
WaitForInputIdle
ShowCaret
DeferWindowPos
DialogBoxIndirectParamA
LoadIconA
GetMenu
CreateCaret
UnionRect
DestroyCursor
LoadAcceleratorsA
OemToCharBuffA
CharToOemW
TranslateAcceleratorA
PostMessageA
RegisterClassA
SendInput
IsCharAlphaW
wsprintfA
GetAltTabInfoA
FindWindowW
GetNextDlgGroupItem
DrawIcon
SetWindowPos
AdjustWindowRectEx
GrayStringW
MessageBoxW
SetLastErrorEx
GetSubMenu
DrawEdge
comdlg32
CommDlgExtendedError
PrintDlgExW
GetFileTitleW
ChooseFontW
PrintDlgW
msvcrt
srand
floor
_controlfp
towlower
strtok
strspn
atoi
strncmp
fputc
rand
wcscmp
__set_app_type
__p__fmode
__p__commode
clearerr
fprintf
_amsg_exit
_initterm
realloc
isupper
gmtime
_ismbblead
memset
_XcptFilter
setlocale
strtol
atol
wcsstr
putc
wcscat
free
_exit
_cexit
wcschr
isspace
fread
clock
time
__setusermatherr
__getmainargs
mktime
mbstowcs
toupper
remove
tolower
wcspbrk
iswalpha
isalpha
kernel32
GetFullPathNameA
LocalLock
GetFileAttributesExW
GetSystemDirectoryA
SetFilePointer
lstrcpynW
GetDateFormatA
TlsSetValue
GetThreadTimes
ReleaseSemaphore
HeapSize
lstrcmpA
CreateEventW
FreeResource
GetFullPathNameW
GetCurrentDirectoryW
GetModuleFileNameA
VirtualQuery
MoveFileExW
GetFileType
SetCommBreak
GetSystemTimeAsFileTime
UnmapViewOfFile
GlobalHandle
CompareStringA
FindNextFileW
GetCommConfig
SetWaitableTimer
LocalFree
WaitForMultipleObjectsEx
GetStartupInfoW
SetCurrentDirectoryA
GetThreadContext
ClearCommBreak
DefineDosDeviceW
IsBadCodePtr
AddAtomW
MulDiv
SetMailslotInfo
ExitThread
CreateNamedPipeA
DeleteFileW
CreatePipe
GlobalUnlock
FindResourceW
GetVersionExW
HeapUnlock
HeapAlloc
GlobalReAlloc
lstrcpyW
lstrcmpW
HeapFree
SetCurrentDirectoryW
GetCurrentThread
OpenFileMappingA
SuspendThread
GetProcessHeap
FindFirstFileA
lstrcpyA
shlwapi
StrToIntA
Exports
Exports
Sections
.text Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 21KB - Virtual size: 205KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 170KB - Virtual size: 170KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ