Static task
static1
Behavioral task
behavioral1
Sample
40c8ea8c48ac1654db4a39d999ed6fb15cdcbb7ff3e202dfaa98ed4813e3d0b2.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
40c8ea8c48ac1654db4a39d999ed6fb15cdcbb7ff3e202dfaa98ed4813e3d0b2.exe
Resource
win10v2004-20220812-en
General
-
Target
40c8ea8c48ac1654db4a39d999ed6fb15cdcbb7ff3e202dfaa98ed4813e3d0b2
-
Size
285KB
-
MD5
4714019fd765aee657021e01d5b70acb
-
SHA1
1d40309a459b4381caf415e821ab0373a04c3108
-
SHA256
40c8ea8c48ac1654db4a39d999ed6fb15cdcbb7ff3e202dfaa98ed4813e3d0b2
-
SHA512
541193c580ae3c3e6f9ddbdab9d28c86f8eb68861f77ba4c31bf65008744c9200369f87037bdebeb109309f2e7519840399d18e761bcd34d96dc8410720ecd4d
-
SSDEEP
3072:qToz5Zfwket+eE5+w+enb74G8O23vTFb++IzcfIp0oKELkjBnScuv3SeW9cltd6Y:qYZfq+eEH74r1TFb+R0CKELk9vDI68F
Malware Config
Signatures
Files
-
40c8ea8c48ac1654db4a39d999ed6fb15cdcbb7ff3e202dfaa98ed4813e3d0b2.exe windows x86
d75c867cab55b7315acc50c2fb9f9dc2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
wininet
InternetCanonicalizeUrlA
InternetQueryOptionA
InternetQueryDataAvailable
InternetGetLastResponseInfoA
InternetSetStatusCallback
InternetSetFilePointer
InternetWriteFile
InternetCloseHandle
InternetOpenA
InternetConnectA
HttpOpenRequestA
InternetErrorDlg
HttpSendRequestA
HttpQueryInfoA
InternetReadFile
InternetCrackUrlA
InternetOpenUrlA
kernel32
ExitProcess
RtlUnwind
HeapAlloc
HeapFree
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
GetSystemTimeAsFileTime
GetStartupInfoA
GetCommandLineA
HeapReAlloc
SetStdHandle
GetFileType
HeapSize
QueryPerformanceCounter
GetCurrentProcessId
SetUnhandledExceptionFilter
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
LCMapStringA
LCMapStringW
GetTimeZoneInformation
GetStringTypeA
GetStringTypeW
GetStdHandle
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetDriveTypeA
IsBadReadPtr
IsBadCodePtr
SetEnvironmentVariableA
SetErrorMode
GetOEMCP
TlsFree
LocalReAlloc
TlsSetValue
TlsAlloc
TlsGetValue
GlobalHandle
GlobalReAlloc
GlobalFlags
InterlockedIncrement
WritePrivateProfileStringA
GetFileTime
RaiseException
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
LocalAlloc
InterlockedDecrement
GetFullPathNameA
GetVolumeInformationA
DuplicateHandle
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
FindFirstFileA
FileTimeToLocalFileTime
FindNextFileA
FindClose
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
lstrcatA
lstrcmpW
SetLastError
FormatMessageA
lstrcpynA
LocalFree
GlobalUnlock
GlobalFree
GetCurrentThread
GetCurrentThreadId
GlobalLock
GlobalAlloc
GlobalDeleteAtom
lstrcmpA
GetModuleFileNameA
GetModuleHandleA
ConvertDefaultLocale
EnumResourceLanguagesA
lstrcpyA
FreeLibrary
LoadLibraryA
GetProcAddress
MulDiv
OutputDebugStringA
FreeResource
GetCPInfo
GetTickCount
GetFileSize
FileTimeToSystemTime
WriteFile
GetFileAttributesA
ReadFile
CreateFileA
SetFilePointer
GetCurrentDirectoryA
GetCurrentProcess
Process32First
Process32Next
GetExitCodeProcess
CreateToolhelp32Snapshot
Module32First
Module32Next
CloseHandle
OpenProcess
TerminateProcess
CompareStringW
CompareStringA
lstrlenA
lstrcmpiA
GetVersion
MultiByteToWideChar
Sleep
CreateMutexA
GetLastError
GetWindowsDirectoryA
CreateDirectoryA
DeleteFileA
SetCurrentDirectoryA
WinExec
WaitForSingleObject
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
user32
ReleaseCapture
EndPaint
BeginPaint
GetWindowDC
DestroyMenu
MoveWindow
SetWindowTextA
IsDialogMessageA
SetMenuItemBitmaps
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
GetMessageA
TranslateMessage
GetCursorPos
ValidateRect
SetWindowContextHelpId
MapDialogRect
RegisterWindowMessageA
WinHelpA
GetCapture
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassInfoExA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SendDlgItemMessageA
GetFocus
SetFocus
IsChild
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
MessageBoxA
GetKeyState
UpdateWindow
AdjustWindowRectEx
GetClassInfoA
RegisterClassA
UnregisterClassA
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
IntersectRect
GetWindowPlacement
PtInRect
GetWindow
CreateDialogIndirectParamA
DestroyWindow
GetDlgItem
IsWindowEnabled
EndDialog
IsWindowVisible
EqualRect
LoadCursorA
IsWindow
IsRectEmpty
SetWindowPos
SetActiveWindow
PostMessageA
SetCursor
GetParent
GetNextDlgTabItem
GetActiveWindow
InvalidateRect
ClientToScreen
GetWindowRect
OffsetRect
GetSysColorBrush
SystemParametersInfoA
GetSysColor
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
ReleaseDC
GetDC
PostThreadMessageA
RegisterClipboardFormatA
MessageBeep
GetNextDlgGroupItem
InvalidateRgn
CopyAcceleratorTableA
ModifyMenuA
GetSubMenu
GetMenuState
GetMenuItemID
GetMenuItemCount
LoadBitmapA
CopyRect
SetRect
GetDesktopWindow
wsprintfA
CharUpperA
CharNextA
SetCapture
GetWindowLongA
SetWindowLongA
GetSystemMetrics
LoadIconA
EnableWindow
GetClientRect
IsIconic
GetSystemMenu
SendMessageA
AppendMenuA
DrawIcon
PostQuitMessage
SetForegroundWindow
FindWindowA
GetMenu
ShowWindow
gdi32
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
ExtSelectClipRgn
GetBkColor
CreateRectRgnIndirect
GetMapMode
GetTextColor
GetRgnBox
CreateBitmap
SetBkColor
SetTextColor
GetStockObject
GetWindowExtEx
GetViewportExtEx
SetMapMode
RestoreDC
SaveDC
GetClipBox
GetDeviceCaps
GetObjectA
SelectObject
DeleteObject
DeleteDC
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
LookupPrivilegeValueA
OpenProcessToken
RegCloseKey
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
RegOpenKeyA
RegDeleteKeyA
RegEnumKeyA
RegQueryValueA
AdjustTokenPrivileges
shell32
SHGetSpecialFolderPathA
SHGetPathFromIDListA
SHGetSpecialFolderLocation
ShellExecuteA
comctl32
ord17
ImageList_Destroy
shlwapi
PathFindExtensionA
PathStripToRootA
PathIsUNCA
PathFindFileNameA
UrlUnescapeA
oledlg
ord8
ole32
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CreateILockBytesOnHGlobal
StgCreateDocfileOnILockBytes
StgOpenStorageOnILockBytes
CoRevokeClassObject
CoTaskMemAlloc
CoGetClassObject
CoTaskMemFree
CoInitialize
CoCreateInstance
CoUninitialize
OleIsCurrentClipboard
OleFlushClipboard
CoRegisterMessageFilter
CLSIDFromString
CLSIDFromProgID
oleaut32
SysAllocStringByteLen
SysStringLen
SysFreeString
SysAllocStringLen
VariantChangeType
SysAllocString
VariantClear
VariantInit
SafeArrayDestroy
SystemTimeToVariantTime
OleCreateFontIndirect
VariantCopy
urlmon
URLDownloadToFileA
iphlpapi
GetAdaptersInfo
Sections
.text Size: 192KB - Virtual size: 188KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 60KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ