Static task
static1
Behavioral task
behavioral1
Sample
40386e670c3ffdc57ba91a116b87d06d2e47e77c4664283a9d7224f266d552db.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
40386e670c3ffdc57ba91a116b87d06d2e47e77c4664283a9d7224f266d552db.exe
Resource
win10v2004-20220812-en
General
-
Target
40386e670c3ffdc57ba91a116b87d06d2e47e77c4664283a9d7224f266d552db
-
Size
458KB
-
MD5
4c787d85ac53104cafa3d943c2a05d06
-
SHA1
949c8d6d0a735f66513ac7684af788d001ac349d
-
SHA256
40386e670c3ffdc57ba91a116b87d06d2e47e77c4664283a9d7224f266d552db
-
SHA512
ff8bc6c5dc8c11b718c4b67c9575511c66bb02f1145501dabfb92579932689c2ac758e1b5ea96b15cfd70f1fd935e7d32f43a3f16a00598e41f5f31d84a6be23
-
SSDEEP
12288:dNqjqJrU+1jsipeNoInKqpd1BLvzvBQV5yr5Jrug5kNsPjiH:dHrT2ipMoSbbzvG6fdkm4
Malware Config
Signatures
Files
-
40386e670c3ffdc57ba91a116b87d06d2e47e77c4664283a9d7224f266d552db.exe windows x86
8c46a4a5608ac59d51310d646325fb67
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ImageList_GetIconSize
ImageList_AddMasked
CreateToolbarEx
ImageList_Copy
InitCommonControlsEx
ImageList_Merge
advapi32
RegEnumKeyW
CryptSignHashW
LookupAccountSidA
RegOpenKeyExW
RegCreateKeyW
RegSetKeySecurity
RegQueryMultipleValuesW
InitiateSystemShutdownW
CryptDestroyKey
CryptContextAddRef
RegLoadKeyA
LookupPrivilegeValueA
RegReplaceKeyW
RegQueryValueW
RegQueryValueExW
RegSetValueW
RegCreateKeyA
RevertToSelf
CryptHashData
CryptAcquireContextA
RegSetValueExA
user32
SwitchToThisWindow
UnregisterHotKey
RegisterClassExA
CreateWindowExW
GetMenuItemRect
RegisterClassA
GetKeyboardLayoutNameW
SendDlgItemMessageW
ShowWindow
SetDlgItemInt
DdeGetLastError
IntersectRect
CloseClipboard
PostQuitMessage
DdeSetQualityOfService
SetUserObjectInformationA
ExitWindowsEx
MessageBoxW
GetFocus
GetInputState
kernel32
GetTimeZoneInformation
LocalReAlloc
GetCurrentThread
GetModuleFileNameW
OpenProcess
CreateMutexA
MultiByteToWideChar
GetVersionExA
GetCurrentProcessId
FindNextFileA
GetFileType
FlushFileBuffers
GetStartupInfoA
TerminateProcess
LCMapStringW
SetStdHandle
IsBadWritePtr
WriteFile
SetConsoleTitleA
UnhandledExceptionFilter
HeapFree
CloseHandle
IsValidLocale
GetEnvironmentStringsW
GetLocaleInfoA
EnumSystemLocalesA
GetTimeFormatA
LeaveCriticalSection
SetHandleCount
LCMapStringA
HeapAlloc
ReadFile
GetConsoleTitleW
GetStringTypeA
EnumResourceNamesW
ExitProcess
SetCurrentDirectoryW
EnterCriticalSection
VirtualFree
GetDateFormatA
CompareStringA
CreateDirectoryW
QueryPerformanceCounter
GetEnvironmentStrings
GetStartupInfoW
GetTickCount
SetLastError
GetCPInfo
InitializeCriticalSection
TlsFree
EnumDateFormatsA
GetCommandLineA
InterlockedExchange
VirtualQuery
FreeEnvironmentStringsA
HeapReAlloc
InterlockedDecrement
GetSystemInfo
GetLocaleInfoW
SetEnvironmentVariableA
GetModuleHandleA
GetSystemTimeAsFileTime
RtlUnwind
HeapCreate
WideCharToMultiByte
GetCommandLineW
GetModuleFileNameA
HeapSize
DeleteCriticalSection
OpenMutexA
RemoveDirectoryW
GetStringTypeW
GetACP
GetOEMCP
VirtualProtect
GetStdHandle
GetCurrentProcess
LoadLibraryA
VirtualAlloc
SetFileAttributesA
IsValidCodePage
TlsAlloc
GetLastError
GetCurrentThreadId
GetUserDefaultLCID
GetProcAddress
CompareStringW
TlsGetValue
SetFilePointer
HeapDestroy
FreeEnvironmentStringsW
TlsSetValue
comdlg32
GetOpenFileNameA
ReplaceTextW
PageSetupDlgA
ChooseFontW
wininet
GetUrlCacheGroupAttributeA
RegisterUrlCacheNotification
InternetUnlockRequestFile
InternetReadFile
GetUrlCacheEntryInfoA
InternetOpenW
Sections
.text Size: 300KB - Virtual size: 299KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 47KB - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 102KB - Virtual size: 102KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ