Static task
static1
Behavioral task
behavioral1
Sample
4840a39f5e732f3270883af6e9b4712ad599a70fe580f3f7fa28d9997d6df9d0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4840a39f5e732f3270883af6e9b4712ad599a70fe580f3f7fa28d9997d6df9d0.exe
Resource
win10v2004-20220901-en
General
-
Target
4840a39f5e732f3270883af6e9b4712ad599a70fe580f3f7fa28d9997d6df9d0
-
Size
140KB
-
MD5
1c26018970a4fa806dab0e78761c6c20
-
SHA1
4e3d0c18c3df6d4fc918aa2b09345133fe13636b
-
SHA256
4840a39f5e732f3270883af6e9b4712ad599a70fe580f3f7fa28d9997d6df9d0
-
SHA512
b520e31a5c6f38eeebc581a1f1158e3bd54beee4a5c480ca591106f48faf4c0fd7a93d382ba8e8f15a363baa525b1c0d703efbb3be4e685e340fb147e1d27905
-
SSDEEP
3072:37jj61pyy+Va/ThzAy9rS0PPCkX3gWrt7SpNn83i6Q:rjj6Pyy+Varh9d6kRWN83rQ
Malware Config
Signatures
Files
-
4840a39f5e732f3270883af6e9b4712ad599a70fe580f3f7fa28d9997d6df9d0.exe windows x86
affa36efad8921fe8158da888fe2efa7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetBkColor
kernel32
LoadResource
GlobalAlloc
GetLastError
FreeLibrary
LockResource
LoadLibraryA
GetUserDefaultLCID
ReleaseSemaphore
TerminateThread
WaitForSingleObject
CloseHandle
FreeResource
LocalFree
ResetEvent
GetLocalTime
SizeofResource
DuplicateHandle
GetCurrentThread
GetCurrentProcess
IsDBCSLeadByte
GlobalReAlloc
GlobalFlags
FindClose
GetStartupInfoA
GetModuleHandleA
GlobalLock
GlobalUnlock
GlobalFree
GetOEMCP
lstrlenW
MultiByteToWideChar
WideCharToMultiByte
lstrcatW
Sleep
SetEvent
user32
SetForegroundWindow
CreatePopupMenu
ReleaseDC
PostQuitMessage
CheckMenuItem
GetCursorPos
DestroyWindow
IsIconic
GetParent
ShowWindow
UpdateWindow
SetCursor
GetDC
EnableWindow
GetDlgItem
CheckDlgButton
IsDlgButtonChecked
DeleteMenu
EndPaint
MoveWindow
GetWindowRect
GetSystemMetrics
BeginPaint
DestroyMenu
TranslateMessage
SetFocus
IsDialogMessage
EnableMenuItem
SetDlgItemInt
TrackPopupMenu
GetDesktopWindow
GetSystemMenu
GetDlgItemInt
MessageBoxW
EndDialog
advapi32
CloseServiceHandle
RegCloseKey
msvcrt
wcsrchr
__set_app_type
_except_handler3
__setusermatherr
_initterm
__p__commode
free
_adjust_fdiv
wcsstr
_wcsnicmp
_endthread
_beginthread
exit
_XcptFilter
_exit
toupper
wcsncpy
malloc
_controlfp
__p__fmode
wcslen
__getmainargs
_acmdln
wcscpy
memset
wcscat
_wcsicmp
memcpy
_wtoi
wcschr
memmove
comctl32
ImageList_SetBkColor
ImageList_Destroy
ImageList_AddMasked
ImageList_Create
ImageList_GetImageCount
ImageList_Draw
shell32
SHGetSpecialFolderLocation
SHFileOperationA
SHGetPathFromIDListW
ole32
CoUninitialize
CoCreateInstance
CoInitialize
CoInitializeEx
w95scm
SQLSCMEnumDependentServicesW
SQLSCMGetServiceStatePlatW
SQLSCMEnumClusterSQLServicesW
SQLSCMControlPlatW
sqlunirl
_CallWindowProc@20
_GetTextExtentPoint@16
_OpenFile_@12
_GetTextExtentPoint32@16
_GetComputerName@8
_GetWindowTextLength@4
_LoadLibrary@4
_GetModuleFileName@12
_FormatMessage@28
_MessageBox@16
_SetWindowLong@12
_DefWindowProc@16
_GetUnicodeRedirectionLayer@0
_SendDlgItemMessage@20
_LoadCursor@8
_FindResource@12
_LoadIcon@8
_PostMessage@16
_SendMessage@16
_CreateDialogIndirectParam@20
_SetDlgItemText@12
_MAKEINTRESOURCE@4
_LoadString@16
_GetObject@12
_GetWindowText@12
_LoadBitmap@8
_GetVersionEx@4
_SetWindowText@8
odbc32
ord136
ord75
ord24
ord155
ord31
ord139
ord9
sqlsvc
QSQLEnumerateServers
Sections
.text Size: 44KB - Virtual size: 43KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE