Static task
static1
Behavioral task
behavioral1
Sample
40df8d4b69fc1a16d747ab6001f57d22cf1311e0110347251950b188f06f60cf.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
40df8d4b69fc1a16d747ab6001f57d22cf1311e0110347251950b188f06f60cf.exe
Resource
win10v2004-20220812-en
General
-
Target
40df8d4b69fc1a16d747ab6001f57d22cf1311e0110347251950b188f06f60cf
-
Size
814KB
-
MD5
66c982493d9f4b8e20ade276127dd4d0
-
SHA1
e334d1936f424c7a83ec5ed050369a7385ed30af
-
SHA256
40df8d4b69fc1a16d747ab6001f57d22cf1311e0110347251950b188f06f60cf
-
SHA512
95ce6c66c3f814fe02dc0a2ecbe5e65ee8883b6ef68cc783432d5f0d9c701a612e4a3ca0616a95727d8ac0d6c8619af30a9e99aededc07de86492091d1cce5c7
-
SSDEEP
24576:GZsGDiuTcp/aW3S5BDCwkZ0TZl488JcPD3:GZsGGuwp/78BDCwLyy
Malware Config
Signatures
Files
-
40df8d4b69fc1a16d747ab6001f57d22cf1311e0110347251950b188f06f60cf.exe windows x86
aa6085c50b9933d60006c7d482f880f4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeleteFileW
GetCurrentDirectoryW
GetFileSize
GetDriveTypeW
GetDriveTypeW
FindResourceA
GetModuleHandleA
IsBadStringPtrW
GetVolumeInformationA
GetModuleFileNameW
VirtualAlloc
lstrlenA
GetDriveTypeW
GetDriveTypeW
GetDriveTypeW
GetDriveTypeW
GetDriveTypeW
msxml6
DllRegisterServer
DllCanUnloadNow
DllGetClassObject
DllSetProperty
Sections
.play Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.odata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gdata Size: 800KB - Virtual size: 2.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ