?GetShiftAltInfo@@YGK_KHE:O
Static task
static1
Behavioral task
behavioral1
Sample
6d9e9e7ef019e3224c391362e41372471c6037fa27316595b9d10b979549f121.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
6d9e9e7ef019e3224c391362e41372471c6037fa27316595b9d10b979549f121.exe
Resource
win10v2004-20220812-en
General
-
Target
6d9e9e7ef019e3224c391362e41372471c6037fa27316595b9d10b979549f121
-
Size
74KB
-
MD5
4bb3cb60f4d3b4bbebc6e18c20fd073a
-
SHA1
2085e85d1aad74aea804ddde79ba841cddf36dac
-
SHA256
6d9e9e7ef019e3224c391362e41372471c6037fa27316595b9d10b979549f121
-
SHA512
99ac7649615986983c2e4186dcc13ffd54a3e8cf1338b15f2c22dec3a5c47be2f680fadc3d86e9998448fca2487e0074894b850a36bea7f6e17e5dd164ec562a
-
SSDEEP
1536:XCMWLAZqRTzssczWRIJR1taWGoNryinNXL:XbBgDoWQR9NX
Malware Config
Signatures
Files
-
6d9e9e7ef019e3224c391362e41372471c6037fa27316595b9d10b979549f121.exe windows x86
091ea4f7e582b481565736c17c3ec268
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
wcstoul
setlocale
wcscoll
_controlfp
atoi
__set_app_type
__p__fmode
gmtime
wcsncpy
isspace
toupper
wcsncmp
strstr
strtoul
vsprintf
sprintf
wcscpy
__p__commode
strcspn
isupper
_amsg_exit
iswctype
swprintf
strtok
fclose
_initterm
_ismbblead
wcspbrk
strtol
fseek
ungetc
_XcptFilter
_exit
fgets
fgetc
iswdigit
strrchr
islower
isxdigit
fflush
iswspace
strncmp
_cexit
__setusermatherr
__getmainargs
sscanf
wcscspn
ftell
kernel32
SetThreadLocale
LocalUnlock
WaitCommEvent
LocalFree
MulDiv
GetFileSize
ClearCommBreak
CreateRemoteThread
CreateMailslotW
SetTimerQueueTimer
GetCommandLineW
FlushViewOfFile
GetVersion
OpenFile
GetUserDefaultLCID
CreateEventW
LoadLibraryA
RemoveDirectoryA
IsBadCodePtr
GetSystemDefaultUILanguage
GetExitCodeThread
CloseHandle
EscapeCommFunction
GetFileAttributesExW
SetCommBreak
RemoveDirectoryW
SetFileApisToOEM
FormatMessageA
LeaveCriticalSection
GlobalMemoryStatus
GetCommConfig
FindNextChangeNotification
FoldStringW
LocalReAlloc
CreatePipe
GetUserDefaultLangID
EnumResourceTypesA
GetShortPathNameA
GetBinaryTypeA
SearchPathW
CopyFileW
SizeofResource
GlobalCompact
VirtualQuery
lstrcpynA
GetModuleFileNameA
GlobalAddAtomW
CreateFileMappingA
CopyFileA
CompareStringA
SetFilePointer
FindFirstChangeNotificationW
SetSystemTimeAdjustment
OpenSemaphoreW
SetCommTimeouts
lstrlenW
user32
CreateWindowExA
GetAsyncKeyState
ScrollWindowEx
InsertMenuA
GetCaretPos
InvalidateRect
RedrawWindow
DrawTextW
SetDlgItemTextA
GetDC
WaitMessage
GetClassInfoW
DrawTextExW
AllowSetForegroundWindow
RemoveMenu
ShowOwnedPopups
LoadAcceleratorsA
InvalidateRgn
mouse_event
IsDialogMessageA
SetFocus
CharUpperBuffW
ChildWindowFromPoint
GetKeyboardLayoutList
GetSystemMetrics
SendDlgItemMessageW
LoadImageA
MapVirtualKeyA
CharLowerBuffW
GetKeyboardType
ValidateRect
CharNextA
DrawTextA
MonitorFromPoint
HiliteMenuItem
GetTopWindow
MapVirtualKeyW
EnumChildWindows
CheckMenuRadioItem
wsprintfA
SetRect
DeleteMenu
GetClipCursor
DestroyMenu
KillTimer
EqualRect
WaitForInputIdle
DrawIconEx
DefDlgProcW
GetMenuItemID
GetMonitorInfoW
InternalGetWindowText
SendMessageTimeoutW
GetSubMenu
LoadMenuA
ShowScrollBar
FindWindowExW
SetWindowTextA
DispatchMessageW
DestroyCaret
GetWindowTextA
LookupIconIdFromDirectory
ActivateKeyboardLayout
GetNextDlgTabItem
SetSysColors
ReplyMessage
GetMenuState
MessageBoxA
ShowCaret
InSendMessage
GetDialogBaseUnits
TabbedTextOutW
DestroyWindow
GetClassNameW
wvsprintfA
EnumWindows
DrawStateW
DefFrameProcA
GetDlgItemInt
SetParent
TranslateMessage
GetUpdateRgn
DragObject
CharUpperA
DeferWindowPos
CharToOemBuffA
SendNotifyMessageW
GetMenuCheckMarkDimensions
DrawMenuBar
IsMenu
DrawIcon
FrameRect
IsCharUpperA
IsWindowUnicode
FindWindowW
GetDlgItemTextA
DefDlgProcA
CharToOemA
PostMessageA
GetWindowRect
CharUpperW
BeginPaint
BringWindowToTop
GetForegroundWindow
GetClassInfoExA
WindowFromPoint
IsIconic
SetUserObjectInformationW
SetWindowTextW
SetDlgItemInt
PostQuitMessage
GetUserObjectInformationW
DialogBoxIndirectParamW
ClipCursor
LoadStringA
CreateDialogParamA
CreatePopupMenu
DialogBoxParamW
GetMenu
ChildWindowFromPointEx
SetScrollRange
Exports
Exports
Sections
.text Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.init Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.erts Size: 512B - Virtual size: 86B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vdata Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.wall Size: 512B - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.info Size: 512B - Virtual size: 128B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.udata Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ