Static task
static1
Behavioral task
behavioral1
Sample
b803c9f6a92bc1f2d61328e95144d0852678a6cbc48f9daf1258282ea459b33c.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b803c9f6a92bc1f2d61328e95144d0852678a6cbc48f9daf1258282ea459b33c.exe
Resource
win10v2004-20220812-en
General
-
Target
b803c9f6a92bc1f2d61328e95144d0852678a6cbc48f9daf1258282ea459b33c
-
Size
193KB
-
MD5
1acb83c4f01e4bda526b8cf90d59302a
-
SHA1
a8434de2f24de1c34f1fb289d66964f5f3c2a66e
-
SHA256
b803c9f6a92bc1f2d61328e95144d0852678a6cbc48f9daf1258282ea459b33c
-
SHA512
4d057c26ff0a26838bb03596dea2b1919eefe5108d921da415cacc759ad596188d8de6a51aab4bc99ee252de2d021b87b936945fc114637c51b85873c0bd1dac
-
SSDEEP
3072:u8lG44ZnGIRLHNw0tOikO60VjnfrahniJPKGgqn41TM:u8lG3hrtw0tOikO6ukWPKGZgTM
Malware Config
Signatures
Files
-
b803c9f6a92bc1f2d61328e95144d0852678a6cbc48f9daf1258282ea459b33c.exe windows x86
917fc2f5d08a4765c574c742498b8f80
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
npscomnctrl
?SetThreadLocaleEx@@YAHK@Z
?FindChildElem@CMarkup@XMLParser@@QAE_NPB_W@Z
?ReadXMLFromFile@CMarkup@XMLParser@@QAE?AV?$CStringT@_WV?$StrTraitMFC_DLL@_WV?$ChTraitsCRT@_W@ATL@@@@@ATL@@V34@@Z
?AddElem@CMarkup@XMLParser@@QAE_NPB_W0@Z
?SetDoc@CMarkup@XMLParser@@QAE_NPB_W@Z
?AddChildElem@CMarkup@XMLParser@@QAE_NPB_W0@Z
?IntoElem@CMarkup@XMLParser@@QAE_NXZ
?Ole2SysDate@NPSSystemDateTime@@QAE?AV?$CStringT@_WV?$StrTraitMFC_DLL@_WV?$ChTraitsCRT@_W@ATL@@@@@ATL@@VCOleDateTime@3@H@Z
?Ole2SysTime@NPSSystemDateTime@@QAE?AV?$CStringT@_WV?$StrTraitMFC_DLL@_WV?$ChTraitsCRT@_W@ATL@@@@@ATL@@VCOleDateTime@3@HH@Z
??0CMarkup@XMLParser@@QAE@XZ
?OutOfElem@CMarkup@XMLParser@@QAE_NXZ
?WriteXMLFile@CMarkup@XMLParser@@QAEXV?$CStringT@_WV?$StrTraitMFC_DLL@_WV?$ChTraitsCRT@_W@ATL@@@@@ATL@@@Z
??0NPSSystemDateTime@@QAE@XZ
??1CMarkup@XMLParser@@UAE@XZ
??1NPSSystemDateTime@@QAE@XZ
?Str2SysDate@NPSSystemDateTime@@QAE?AV?$CStringT@_WV?$StrTraitMFC_DLL@_WV?$ChTraitsCRT@_W@ATL@@@@@ATL@@V23@H@Z
?IsWellFormed@CMarkup@XMLParser@@QAE_NXZ
npsdbproxy
?GetTableInfo@CNPSDBProxy@@QAEPAVCObject@@PB_W@Z
??1CNPSDBProxy@@QAE@XZ
??0CNPSDBProxy@@QAE@XZ
?ExecuteQuery@CNPSDBProxy@@QAEHPB_WH@Z
?Open@CNPSDBProxy@@QAEHPB_W0H@Z
?ExistTable@CNPSDBProxy@@QAEHPB_W@Z
?Close@CNPSDBProxy@@QAEHXZ
?ExecuteQuery@CNPSDBProxy@@QAEHPB_WAAV?$vector@V?$vector@V?$CStringT@_WV?$StrTraitMFC_DLL@_WV?$ChTraitsCRT@_W@ATL@@@@@ATL@@V?$allocator@V?$CStringT@_WV?$StrTraitMFC_DLL@_WV?$ChTraitsCRT@_W@ATL@@@@@ATL@@@std@@@std@@V?$allocator@V?$vector@V?$CStringT@_WV?$StrTraitMFC_DLL@_WV?$ChTraitsCRT@_W@ATL@@@@@ATL@@V?$allocator@V?$CStringT@_WV?$StrTraitMFC_DLL@_WV?$ChTraitsCRT@_W@ATL@@@@@ATL@@@std@@@std@@@2@@std@@@Z
mfc80u
ord4475
ord3943
ord2638
ord3703
ord3713
ord3712
ord2527
ord2640
ord2534
ord2832
ord283
ord2708
ord4535
ord4301
ord2829
ord4028
ord3677
ord2725
ord2531
ord280
ord5562
ord2261
ord5209
ord2239
ord5226
ord566
ord4562
ord899
ord757
ord1182
ord3942
ord5222
ord5220
ord2925
ord293
ord1911
ord3826
ord5378
ord577
ord6215
ord5096
ord762
ord1007
ord3800
ord5579
ord2009
ord2054
ord4320
ord6274
ord3795
ord6272
ord4008
ord776
ord4032
ord3824
ord1049
ord5971
ord3103
ord2409
ord6700
ord600
ord4255
ord2402
ord2407
ord2390
ord2392
ord4743
ord2394
ord282
ord2388
ord265
ord2404
ord2384
ord1479
ord931
ord3990
ord1894
ord5398
ord927
ord929
ord925
ord5485
ord2468
ord920
ord5229
ord5231
ord5956
ord3635
ord1591
ord4276
ord4716
ord3397
ord4574
ord6061
ord2311
ord5171
ord774
ord5199
ord4179
ord6271
ord5067
ord1118
ord1899
ord5148
ord4238
ord1392
ord3940
ord354
ord1608
ord605
ord1611
ord5908
ord6720
ord1058
ord1079
ord4256
ord1542
ord4480
ord1661
ord2856
ord1662
ord5196
ord2011
ord4026
ord386
ord1590
ord4884
ord501
ord631
ord1646
ord4729
ord709
ord2271
ord1647
ord4206
ord1955
ord5178
ord1353
ord4961
ord3339
ord6275
ord3796
ord6273
ord1513
ord2163
ord2169
ord2399
ord2381
ord1472
ord2379
ord2397
ord3327
ord764
ord1198
ord2386
ord3176
msvcr80
_localtime64_s
_wtoi
_invalid_parameter_noinfo
??0exception@std@@QAE@XZ
??0exception@std@@QAE@ABQBD@Z
??0exception@std@@QAE@ABV01@@Z
_amsg_exit
__wgetmainargs
_cexit
_exit
_XcptFilter
exit
_wcmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
_gmtime64_s
_encode_pointer
__set_app_type
_unlock
__dllonexit
_lock
_onexit
_decode_pointer
?terminate@@YAXXZ
_except_handler4_common
_invoke_watson
_controlfp_s
_crt_debugger_hook
?_type_info_dtor_internal_method@type_info@@QAEXXZ
free
_wtof
swscanf_s
ceil
floor
wcsftime
?what@exception@std@@UBEPBDXZ
_time64
??1exception@std@@UAE@XZ
wcscpy_s
__p__fmode
__CxxFrameHandler3
memset
_CxxThrowException
_wcsdup
kernel32
GetThreadLocale
GetLocaleInfoA
GetACP
SetUnhandledExceptionFilter
GetVersionExA
InterlockedCompareExchange
Sleep
InterlockedExchange
QueryPerformanceCounter
CreateMutexW
GetTickCount
GetCurrentThreadId
GetStartupInfoW
GetCurrentProcessId
IsDebuggerPresent
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetLastError
OutputDebugStringW
LoadLibraryW
user32
LoadIconW
DrawIcon
KillTimer
SetTimer
GetClientRect
GetSystemMetrics
IsIconic
RegisterWindowMessageW
SendMessageW
PostMessageW
EnableWindow
advapi32
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
shell32
SHGetFolderPathW
comctl32
InitCommonControlsEx
shlwapi
PathAppendW
ole32
StringFromGUID2
CoCreateGuid
oleaut32
SystemTimeToVariantTime
VarUdateFromDate
VarDateFromStr
VariantTimeToSystemTime
msvcp80
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBD@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
Sections
.text Size: 44KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.mrdata Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE