Static task
static1
Behavioral task
behavioral1
Sample
c908b01b103b9001f50fcb38c0e5e80a7ca02a818249e9c0cc110cba1ec9906a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c908b01b103b9001f50fcb38c0e5e80a7ca02a818249e9c0cc110cba1ec9906a.exe
Resource
win10v2004-20220812-en
General
-
Target
c908b01b103b9001f50fcb38c0e5e80a7ca02a818249e9c0cc110cba1ec9906a
-
Size
104KB
-
MD5
a10e28b76f8f3099282e51dd98b6a1a1
-
SHA1
f67b7dd601b57b2596ecfc5200f57a1afb13ed8c
-
SHA256
c908b01b103b9001f50fcb38c0e5e80a7ca02a818249e9c0cc110cba1ec9906a
-
SHA512
cf1e38504856c74a5c6f173c73f8f4d46ff1ec33428bc232313188c1eb63bcbd40b4a38405713324ad3f9f254f5bc19ffe1bb24b74b27210c657a44f132ffaad
-
SSDEEP
1536:Gl4RABa2JPH9Kq0qz/ddDi+oPg0YVq8uY/XV+Sujm6O/RD:Gl4RABDKqbDupQvuY/ozjm6O5D
Malware Config
Signatures
Files
-
c908b01b103b9001f50fcb38c0e5e80a7ca02a818249e9c0cc110cba1ec9906a.exe windows x86
2a8dc0f740a6c24019cc416f59339d0b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
apdboot
?GetAPDLocaleString@CAPDBootInformationHandler@@QAE_NAAV?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@@Z
?SetAPDLaunchStatus@CAPDBootInformationHandler@@QAE_NJ@Z
?GetAPDLaunchStatus@CAPDBootInformationHandler@@QAE_NXZ
?ParseCommandLineParameter@CAPDBootCommandHandler@@QAEXAAV?$vector@V?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@V?$allocator@V?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@@2@@std@@@Z
?SetApplicationDefaultStatus@CAPDBootCommandHandler@@QAE_NAAV?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@0@Z
?TakeControl@CAPDBootCommandHandler@@QAE_NXZ
?MaintainOrder@CAPDBootInformationHandler@@QAEXXZ
?Uninstall@CAPDBootInformationHandler@@QAEXXZ
?RegisterDeviceConnectCallback@@YAXP6GXAAV?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@0@Z@Z
?StartDeviceConnectService@@YAXXZ
?LaunchDefaultAPD@CAPDBootCommandHandler@@QAEXAAV?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@0@Z
?StopPSE3AutoLaunch@CAPDBootInformationHandler@@QAEXXZ
comctl32
ord17
kernel32
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetStartupInfoA
GetModuleHandleA
GetCurrentProcessId
ExitProcess
LoadLibraryW
GetProcAddress
FreeLibrary
lstrcpynW
GetSystemTimeAsFileTime
OutputDebugStringW
user32
GetCursorPos
CreateDialogParamW
DestroyIcon
DestroyWindow
GetSystemMetrics
GetSystemMenu
DispatchMessageW
TranslateMessage
GetMessageW
CreateWindowExW
DestroyMenu
TrackPopupMenu
SetForegroundWindow
SetMenuDefaultItem
InsertMenuW
LoadStringW
CreatePopupMenu
AppendMenuW
SendMessageW
LoadImageW
shell32
Shell_NotifyIconW
msvcp71
??1?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAE@XZ
?clear@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAEXXZ
??0?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAE@XZ
?c_str@?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QBEPBGXZ
??0?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAE@ABV01@@Z
??0?$basic_string@GU?$char_traits@G@std@@V?$allocator@G@2@@std@@QAE@PBG@Z
msvcr71
memset
wcsncpy
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_amsg_exit
_acmdln
exit
_cexit
_ismbblead
_XcptFilter
_exit
_c_exit
_onexit
__dllonexit
_except_handler3
__security_error_handler
__CxxFrameHandler
??3@YAXPAX@Z
wcscmp
_wcsicmp
Sections
.text Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 596B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE