Static task
static1
Behavioral task
behavioral1
Sample
40e5fc09b349f39a889f7c986ca0b72cb8995a57c7fb663cebc2e07af9977c9b.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
40e5fc09b349f39a889f7c986ca0b72cb8995a57c7fb663cebc2e07af9977c9b.exe
Resource
win10v2004-20220812-en
General
-
Target
40e5fc09b349f39a889f7c986ca0b72cb8995a57c7fb663cebc2e07af9977c9b
-
Size
724KB
-
MD5
90932ca1add5ead11d5b5a7dbbe6686b
-
SHA1
4efddc4271cf700fbeac6c147b375c14c8a2c721
-
SHA256
40e5fc09b349f39a889f7c986ca0b72cb8995a57c7fb663cebc2e07af9977c9b
-
SHA512
f93f20297e28a1da07c53882182acad8f57871d52901ffa62b87aba1c6c653278178b44a2617b702d28e650fde849fc9fe1e68b7b5b452854bc3e615af617f63
-
SSDEEP
12288:CxbdU2tW3ILQ1z+mfpAoXh8KAA4Wt787d+zB3WbQ:GU2tgLtfpZXh8//Wt7878z
Malware Config
Signatures
Files
-
40e5fc09b349f39a889f7c986ca0b72cb8995a57c7fb663cebc2e07af9977c9b.exe windows x86
e94227030f16a21c04c0fc19f681c9a7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
htons
htonl
ntohl
inet_ntoa
gethostbyname
ntohs
mfc42
ord5300
ord3346
ord2396
ord5199
ord5302
ord4698
ord5307
ord5289
ord2725
ord4079
ord4622
ord5714
ord561
ord815
ord1200
ord1247
ord2621
ord1168
ord1134
ord3262
ord2841
ord3738
ord2107
ord5450
ord5440
ord3663
ord6394
ord5834
ord2044
ord4160
ord2817
ord3619
ord1641
ord3626
ord2414
ord4396
ord4299
ord2078
ord1175
ord6199
ord5265
ord4376
ord2448
ord2514
ord6052
ord1775
ord6383
ord3597
ord2086
ord6215
ord3402
ord3721
ord795
ord2116
ord4853
ord2574
ord3572
ord609
ord1793
ord2379
ord3021
ord5875
ord2859
ord2642
ord5981
ord1088
ord2122
ord2639
ord6358
ord3573
ord641
ord324
ord4234
ord5280
ord755
ord470
ord3693
ord4133
ord4297
ord5788
ord1176
ord4123
ord4476
ord4710
ord2452
ord640
ord1640
ord323
ord4425
ord5785
ord1146
ord1940
ord556
ord809
ord4270
ord3571
ord6172
ord3922
ord1089
ord6877
ord3874
ord5789
ord2860
ord1114
ord1113
ord939
ord3742
ord941
ord1799
ord614
ord290
ord6375
ord5873
ord6648
ord6662
ord5431
ord3348
ord4351
ord2989
ord3353
ord3579
ord619
ord2625
ord297
ord2033
ord3780
ord2077
ord5809
ord2988
ord772
ord4021
ord5860
ord500
ord2029
ord1228
ord1639
ord1638
ord5810
ord5481
ord2031
ord4863
ord5796
ord5478
ord966
ord3570
ord605
ord278
ord4335
ord4411
ord4447
ord4919
ord4975
ord1971
ord1670
ord349
ord5480
ord2449
ord926
ord922
ord923
ord4277
ord2764
ord6282
ord2784
ord4204
ord3500
ord2152
ord654
ord610
ord801
ord341
ord287
ord541
ord5603
ord5606
ord5602
ord5608
ord5858
ord6883
ord5857
ord5731
ord6140
ord6142
ord6139
ord6143
ord3981
ord3986
ord6781
ord3979
ord446
ord743
ord3127
ord3616
ord5651
ord3126
ord3613
ord350
ord2393
ord2512
ord940
ord2754
ord2554
ord2648
ord4441
ord4837
ord3798
ord5290
ord4353
ord6374
ord5163
ord2385
ord5241
ord4407
ord1776
ord4078
ord6055
ord4003
ord2915
ord823
ord537
ord860
ord5683
ord4129
ord535
ord2818
ord825
ord540
ord924
ord858
ord800
ord4486
ord5710
ord4274
ord4673
ord3318
ord354
ord5186
ord538
ord1979
ord665
ord1265
ord5572
ord2233
ord1233
ord3258
ord2864
ord2730
ord6442
ord2729
ord4275
ord6467
ord2727
ord2614
ord1949
ord567
ord4627
ord818
ord4424
ord3825
ord4080
ord3079
ord2976
ord3831
ord3830
ord3136
ord3081
ord2985
ord3147
ord4465
ord3259
ord2124
ord2982
ord5277
ord1727
ord2446
ord5261
ord6376
ord5065
ord3749
ord4226
ord2055
ord2763
ord2567
ord5861
ord6223
ord2827
ord5442
ord1576
msvcrt
??1type_info@@UAE@XZ
__dllonexit
?terminate@@YAXXZ
_except_handler3
_XcptFilter
_onexit
_exit
__getmainargs
exit
_acmdln
_adjust_fdiv
_initterm
__setusermatherr
__set_app_type
__p__commode
__p__fmode
__p___argc
_mbsnbcpy
_mbsrchr
__p___argv
__CxxFrameHandler
_ui64toa
_mbsnbcat
_mbsstr
_mbsicmp
_setmbcp
_beginthreadex
_mbscmp
_vsnprintf
_CxxThrowException
_snprintf
strftime
localtime
time
_controlfp
rand
sprintf
strncpy
strstr
strcpy
atol
fclose
memcpy
memcmp
memset
strlen
sscanf
atoi
_purecall
memmove
fopen
fread
kernel32
CreateFileMappingA
MapViewOfFile
lstrcatA
GetWindowsDirectoryA
GetShortPathNameA
MoveFileExA
HeapAlloc
GetProcessHeap
WaitForSingleObject
HeapFree
GetTickCount
CreateMutexA
TerminateThread
ReleaseMutex
LoadLibraryA
GetLastError
FreeLibrary
Sleep
GetProcAddress
OutputDebugStringA
GetCurrentProcess
CreateProcessA
FileTimeToLocalFileTime
FileTimeToSystemTime
GetProcessTimes
SetFilePointer
ReadFile
CreateFileA
SetEndOfFile
CloseHandle
WriteFile
GetFileAttributesA
WritePrivateProfileStructA
CreateDirectoryA
WritePrivateProfileStringA
GetPrivateProfileStringA
DeleteFileA
GetModuleHandleA
GetModuleFileNameA
GetVersionExA
InterlockedIncrement
InterlockedDecrement
GetPrivateProfileIntA
InitializeCriticalSection
DeleteCriticalSection
CreateEventA
IsBadReadPtr
LeaveCriticalSection
SetEvent
GlobalFree
lstrlenA
EnterCriticalSection
GetTempFileNameA
GetTempPathA
MultiByteToWideChar
lstrlenW
GetStartupInfoA
WideCharToMultiByte
SetFileAttributesA
CopyFileA
GetFileSize
UnmapViewOfFile
HeapReAlloc
lstrcpyA
user32
SetTimer
ScreenToClient
OffsetRect
LoadImageA
PeekMessageA
WindowFromPoint
GetDC
SetWindowRgn
IsIconic
FillRect
PostMessageA
IsWindow
GetDesktopWindow
GetCursorPos
GetWindowDC
ReleaseDC
SetForegroundWindow
LoadBitmapA
CopyRect
wsprintfA
SetActiveWindow
CreateWindowExA
DestroyWindow
PostQuitMessage
PostThreadMessageA
MessageBoxA
GetWindowRect
SendMessageA
InvalidateRect
GetClientRect
ReleaseCapture
SetWindowPos
ShowWindow
SetRect
GetSystemMetrics
DispatchMessageA
FindWindowA
RegisterClassExA
SetWindowLongA
GetWindowLongA
DefWindowProcA
EnableWindow
KillTimer
GetMessageA
TranslateMessage
gdi32
BitBlt
CreateFontA
CreateSolidBrush
DeleteObject
CreatePen
OffsetRgn
CombineRgn
CreateRectRgn
GetDIBits
GetObjectA
ExtCreateRegion
CreateDIBSection
SelectObject
CreateCompatibleDC
CreateBitmap
StretchBlt
SetTextColor
SetBkColor
DeleteDC
GetTextMetricsA
GetTextExtentPoint32A
advapi32
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
shell32
ShellExecuteA
SHGetSpecialFolderPathA
SHGetSpecialFolderLocation
SHGetPathFromIDListA
comctl32
_TrackMouseEvent
ole32
CoCreateGuid
StgOpenStorage
StgCreateDocfile
CoTaskMemFree
CoTaskMemAlloc
CoInitialize
CoUninitialize
wsock32
inet_ntoa
ioctlsocket
listen
setsockopt
WSAGetLastError
gethostname
getsockopt
msvcp60
??8std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@PBD@Z
?_Xran@std@@YAXXZ
?max_size@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIXZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?_Xlen@std@@YAXXZ
??1_Lockit@std@@QAE@XZ
??0_Lockit@std@@QAE@XZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?rfind@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?substr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBE?AV12@II@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Refcnt@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEAAEPBD@Z
?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV?$allocator@D@1@@Z
??8std@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@0@Z
?find@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIPBDII@Z
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
wininet
InternetOpenA
HttpQueryInfoA
InternetQueryOptionA
InternetCloseHandle
InternetErrorDlg
HttpOpenRequestA
InternetSetOptionA
HttpSendRequestA
InternetConnectA
Sections
.text Size: 284KB - Virtual size: 282KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 64KB - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 124KB - Virtual size: 123KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.T� Size: 236KB - Virtual size: 236KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE