?QQStart@@YGXK@Z
Static task
static1
Behavioral task
behavioral1
Sample
f47503d0440cbc22dcb63ac62949b183d6c694b53c950b5803d83472b86554e9.dll
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f47503d0440cbc22dcb63ac62949b183d6c694b53c950b5803d83472b86554e9.dll
Resource
win10v2004-20220812-en
General
-
Target
f47503d0440cbc22dcb63ac62949b183d6c694b53c950b5803d83472b86554e9
-
Size
66KB
-
MD5
cf8a88c71124955520bd931b8754a70e
-
SHA1
91a4b9c0fbdb3319e4bec72975a365007f347c0e
-
SHA256
f47503d0440cbc22dcb63ac62949b183d6c694b53c950b5803d83472b86554e9
-
SHA512
ad27676c826553ca85b48cb159c9ca472fc0155d9324893da9a4b5c8ea9a0fd5dc73b7f02571d176e7fad8e1dde65f903b83257ed539e8c7fe2c05989ee1a7db
-
SSDEEP
1536:EvoVLEKU+RN3Z2CAzHTHw02Y8rkaVINMwmpk:tBnjIzH2lrnINM5y
Malware Config
Signatures
Files
-
f47503d0440cbc22dcb63ac62949b183d6c694b53c950b5803d83472b86554e9.dll windows x86
02401518d107128bbe4f985673634a06
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
winmm
sndPlaySoundA
urlmon
URLDownloadToFileA
wininet
DeleteUrlCacheEntry
InternetOpenA
InternetOpenUrlA
InternetCloseHandle
InternetReadFile
kernel32
lstrcpynA
GetModuleHandleA
Process32Next
Process32First
CreateToolhelp32Snapshot
CloseHandle
VirtualFreeEx
ReadProcessMemory
VirtualAllocEx
OpenProcess
CreateThread
GetLastError
GetModuleFileNameA
GetProcAddress
FreeLibrary
LoadLibraryA
GetSystemDirectoryA
GetPrivateProfileStringA
GetTickCount
GetVersionExA
WriteFile
CreateFileA
SetFilePointer
GetLocalTime
ReadFile
GetPrivateProfileIntA
LocalFree
FindResourceA
LoadResource
SizeofResource
GlobalLock
GlobalUnlock
MultiByteToWideChar
Sleep
DeleteFileA
ExitProcess
GlobalAlloc
GlobalFree
CreateDirectoryA
LocalAlloc
CreateMutexA
user32
LoadIconA
GetWindowTextA
FindWindowExA
FindWindowA
GetWindowThreadProcessId
SendMessageA
CharLowerA
SetWindowLongA
GetWindowLongA
CreateDialogParamA
IsWindow
DispatchMessageA
TranslateMessage
TranslateAcceleratorA
GetMessageA
RegisterClassExA
UpdateWindow
CreateWindowExA
PostQuitMessage
DestroyIcon
SetWindowPos
SetWindowRgn
GetCursorPos
GetDC
GetClassLongA
FillRect
ReleaseDC
MoveWindow
SetTimer
DefWindowProcA
ShowWindow
PtInRect
LoadCursorA
SetCursor
KillTimer
GetWindowDC
wsprintfA
GetWindowRect
GetSystemMetrics
gdi32
SelectObject
BitBlt
GetObjectA
CreateCompatibleDC
CreatePolygonRgn
TextOutA
SetTextColor
CreateFontA
SetPixel
SetBkMode
GetTextExtentPoint32A
GetStockObject
LineTo
MoveToEx
CreatePen
Rectangle
CreateSolidBrush
CreateCompatibleBitmap
StretchBlt
DeleteObject
advapi32
RegQueryValueExA
RegOpenKeyExA
RegOpenKeyA
RegCloseKey
shell32
ShellExecuteA
Shell_NotifyIconA
ole32
CreateStreamOnHGlobal
gdiplus
GdiplusShutdown
GdipLoadImageFromStream
GdipCreateBitmapFromFile
GdipCreateHBITMAPFromBitmap
GdiplusStartup
GdipDisposeImage
Exports
Exports
Sections
.text Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 20B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 29KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ