Static task
static1
Behavioral task
behavioral1
Sample
d40a0e3112b2e743db200ada9dfa0bcde2e55e071b0b8871bdf5f4ddb48fa20d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d40a0e3112b2e743db200ada9dfa0bcde2e55e071b0b8871bdf5f4ddb48fa20d.exe
Resource
win10v2004-20220812-en
General
-
Target
d40a0e3112b2e743db200ada9dfa0bcde2e55e071b0b8871bdf5f4ddb48fa20d
-
Size
562KB
-
MD5
53d065d08bc1d6c385e3844f522bc030
-
SHA1
1081317bf49bdea78faed73d46351234f7d3e870
-
SHA256
d40a0e3112b2e743db200ada9dfa0bcde2e55e071b0b8871bdf5f4ddb48fa20d
-
SHA512
ef63e2399a53691ed9f30fdad31595a58376693caa26a9042b3312025a73d0bf010f2c6b9b621868136d0353e7c6d8ba70a5bf03f95f129e7268b45245d1cf43
-
SSDEEP
12288:rJPdjNIaRAQUfR/nLoyX/mHfg/tcqkWVfaLv/jZJNY/3/XPpZMbU:1/UmHfC6WVyLv7HNq3/Xnb
Malware Config
Signatures
Files
-
d40a0e3112b2e743db200ada9dfa0bcde2e55e071b0b8871bdf5f4ddb48fa20d.exe windows x86
6e95cbc9778663cb509322d7f565485e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetPrivateProfileIntW
WriteFile
ReadFile
CreateFileW
GetPrivateProfileSectionNamesW
OpenProcess
GetTickCount
WaitForSingleObject
GetProcAddress
LoadLibraryW
GetModuleHandleW
SetFileAttributesW
FindNextFileW
FindClose
lstrlenW
GetFileAttributesW
CopyFileW
CreateDirectoryW
FindFirstFileW
GetVolumeInformationW
CloseHandle
DeviceIoControl
GetLastError
MultiByteToWideChar
GetVersionExW
GetCurrentProcess
SetPriorityClass
CreateFileA
GetTempPathW
LocalFree
GetModuleFileNameW
InitializeCriticalSectionAndSpinCount
GetPrivateProfileStringW
WideCharToMultiByte
GetCommandLineW
InterlockedIncrement
InterlockedDecrement
EncodePointer
DecodePointer
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
Sleep
GetStringTypeW
GetSystemTimeAsFileTime
HeapFree
HeapAlloc
IsDebuggerPresent
IsProcessorFeaturePresent
GetCPInfo
HeapReAlloc
RaiseException
RtlUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
SetLastError
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
ExitProcess
GetModuleHandleExW
HeapSize
GetCurrentThreadId
GetStdHandle
IsValidCodePage
GetACP
GetOEMCP
GetProcessHeap
GetFileType
QueryPerformanceCounter
GetCurrentProcessId
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetTimeZoneInformation
GetConsoleCP
GetConsoleMode
SetFilePointerEx
LoadLibraryExW
OutputDebugStringW
SetStdHandle
WriteConsoleW
FlushFileBuffers
SetEnvironmentVariableA
CreateProcessW
ExpandEnvironmentStringsW
ReleaseMutex
SetFilePointer
CreateMutexW
OutputDebugStringA
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
advapi32
RegOpenCurrentUser
RegEnumKeyExW
RegQueryInfoKeyW
ConvertSidToStringSidW
RevertToSelf
ImpersonateLoggedOnUser
GetTokenInformation
GetUserNameW
RegSetValueExW
RegCreateKeyExW
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
shell32
SHGetSpecialFolderPathW
ShellExecuteW
SHGetFolderPathW
CommandLineToArgvW
ole32
CoInitialize
CoCreateInstance
CoUninitialize
shlwapi
SHRegCloseUSKey
PathAppendW
SHRegGetUSValueW
PathFindExtensionW
PathFindFileNameW
StrTrimW
SHRegSetUSValueW
StrChrW
StrRChrW
PathFileExistsW
SHRegEnumUSKeyW
SHRegOpenUSKeyW
winmm
timeGetTime
user32
MessageBoxW
wininet
InternetOpenW
InternetConnectW
HttpSendRequestW
HttpOpenRequestW
InternetCloseHandle
Sections
.text Size: 321KB - Virtual size: 320KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 100KB - Virtual size: 99KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 2B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 122KB - Virtual size: 122KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ