?GetShiftAltInfo@@YGK_KHE:O
Static task
static1
Behavioral task
behavioral1
Sample
de241542d0fb0d6024c9aab1947e283747599c2b341e5f3e81cf9858e88cc8e5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
de241542d0fb0d6024c9aab1947e283747599c2b341e5f3e81cf9858e88cc8e5.exe
Resource
win10v2004-20220812-en
General
-
Target
de241542d0fb0d6024c9aab1947e283747599c2b341e5f3e81cf9858e88cc8e5
-
Size
175KB
-
MD5
386a02906b700412eba8b289ae96561d
-
SHA1
5d1ac8925511f44235cee5e693047e5d1c61770d
-
SHA256
de241542d0fb0d6024c9aab1947e283747599c2b341e5f3e81cf9858e88cc8e5
-
SHA512
bc82640a533c281d493aa7a14cabfbcc25d4b0a7324e7e96944fb824694a03191cfaf153130d61eed8e5a80278ddcce4f3fa5af9c1da53b46b86a2cb74a71440
-
SSDEEP
3072:NAYAFfvwCbBLziVsbFtnKIrCGdfCGnCILVRlENe7bE3ZKRWeGCjSvK4B5z9S8:NTARJbBLtbFtKNGBCGCIPlNWebjSy4PN
Malware Config
Signatures
Files
-
de241542d0fb0d6024c9aab1947e283747599c2b341e5f3e81cf9858e88cc8e5.exe windows x86
607629eaf0487508de3898259127321a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shlwapi
StrToIntW
user32
RegisterWindowMessageA
GetKeyboardLayout
EndPaint
RegisterClassW
MapVirtualKeyA
InsertMenuW
LoadStringW
LoadMenuW
SetFocus
CreateWindowExA
InSendMessage
WindowFromPoint
CreateWindowExW
RedrawWindow
GetParent
EnumThreadWindows
SendInput
LoadIconA
DestroyMenu
ReleaseDC
DestroyCursor
CreateIconIndirect
IsWindowUnicode
FindWindowExW
wvsprintfA
BeginDeferWindowPos
EnableMenuItem
GetClassInfoA
SetWindowLongW
ReplyMessage
SendMessageW
MessageBoxA
IsDlgButtonChecked
SetClassLongW
GetWindowRect
SetWindowPos
MessageBoxExA
DialogBoxIndirectParamW
GetNextDlgGroupItem
DestroyAcceleratorTable
GetDCEx
ScrollWindow
GetSystemMetrics
ShowWindowAsync
IsCharLowerA
SetScrollPos
GetWindowTextA
DialogBoxParamW
MonitorFromPoint
DrawIconEx
FindWindowA
GetSystemMenu
ClientToScreen
CharLowerW
GetClassInfoW
VkKeyScanW
CheckRadioButton
CharUpperBuffW
GetClassLongA
DrawTextA
IsCharAlphaW
GetAsyncKeyState
keybd_event
DefFrameProcW
CharNextW
GetDoubleClickTime
wsprintfA
MoveWindow
GetMenuItemCount
DrawTextW
ShowWindow
GetMessageTime
GetKeyboardLayoutList
SetMenuDefaultItem
CopyImage
ShowScrollBar
IsMenu
LoadImageW
DestroyWindow
GetDlgItemInt
CreateDialogParamA
MapVirtualKeyExW
RegisterClassA
GetActiveWindow
GetWindowDC
PostMessageW
EqualRect
GetMessageA
TileWindows
LoadImageA
GetWindowTextLengthW
SystemParametersInfoW
SetParent
AppendMenuW
GetWindowPlacement
InSendMessageEx
GetMenu
DrawStateW
CharUpperBuffA
PeekMessageA
TranslateAcceleratorA
SetDlgItemTextA
CharUpperW
GetMenuCheckMarkDimensions
GetClientRect
PostMessageA
DrawEdge
GetMessagePos
OemToCharBuffA
CharLowerBuffW
SetSysColors
RegisterHotKey
GetWindowLongA
AttachThreadInput
IsIconic
InsertMenuA
SendMessageTimeoutA
TranslateMessage
DefFrameProcA
RemovePropW
DestroyIcon
msvcrt
fwrite
wcscoll
_controlfp
realloc
wcstol
time
toupper
strncpy
__set_app_type
__p__fmode
__p__commode
_amsg_exit
wcspbrk
putchar
sprintf
malloc
rand
putc
localtime
_initterm
isalpha
iswdigit
qsort
wcsrchr
wcstod
strcoll
clearerr
_ismbblead
towlower
fseek
swprintf
iswprint
iswxdigit
_XcptFilter
_exit
iswspace
_cexit
iswalpha
__setusermatherr
atoi
strtok
isdigit
wcsncmp
isupper
getc
__getmainargs
setvbuf
kernel32
LoadLibraryA
SetNamedPipeHandleState
DeleteCriticalSection
FindResourceA
EnterCriticalSection
lstrlenA
MoveFileA
SizeofResource
OpenEventA
SetLastError
CreateDirectoryW
HeapAlloc
GetFileTime
GetTempPathA
GetThreadContext
GetCompressedFileSizeW
CreateDirectoryA
GetModuleHandleA
SearchPathW
CreateWaitableTimerW
FindResourceW
TlsGetValue
IsDBCSLeadByte
HeapSize
SetMailslotInfo
FindFirstFileA
GetShortPathNameA
LockFile
LocalSize
CreateSemaphoreA
CreateFileW
SetCommMask
SetThreadContext
CreateFileMappingW
GetLocalTime
FileTimeToLocalFileTime
PulseEvent
VirtualFree
lstrcpyW
QueryPerformanceCounter
GetFileAttributesExA
SetPriorityClass
GetCurrentThread
CreateNamedPipeA
GlobalAddAtomW
CreatePipe
LockResource
TryEnterCriticalSection
SuspendThread
GlobalAlloc
GetLastError
GetCurrentThreadId
HeapFree
LCMapStringW
LocalFree
SetFilePointer
Exports
Exports
Sections
.text Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bit Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.insec Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.inmin Size: 512B - Virtual size: 86B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.wall Size: 512B - Virtual size: 258KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.zdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 142KB - Virtual size: 141KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ