Static task
static1
Behavioral task
behavioral1
Sample
f40ba45e798e640e97805bc7e922cdc252aeb53d6d61c661fed8e1af3c5ae6ca.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f40ba45e798e640e97805bc7e922cdc252aeb53d6d61c661fed8e1af3c5ae6ca.exe
Resource
win10v2004-20220901-en
General
-
Target
f40ba45e798e640e97805bc7e922cdc252aeb53d6d61c661fed8e1af3c5ae6ca
-
Size
260KB
-
MD5
82f85f6ca5345597cad698dc38f89f45
-
SHA1
ad7a07fefaed4f7d0138cf510ecc3ba7850890a8
-
SHA256
f40ba45e798e640e97805bc7e922cdc252aeb53d6d61c661fed8e1af3c5ae6ca
-
SHA512
57e03631a6cad0bf4c3fb2bc56ee4ca193f65767d6b1c7d5060b53486b03d9d954f5489f648058f805a89e4cdfff668491344e8244001af0e6d11040f4a45f06
-
SSDEEP
6144:LGVb3PXAsoaGQ7fbijrqKa3ZmD38V1EwmpjDsj:LGtPym7forqKawD38V1peD0
Malware Config
Signatures
Files
-
f40ba45e798e640e97805bc7e922cdc252aeb53d6d61c661fed8e1af3c5ae6ca.exe windows x86
6e1133bd376b00a51912793b43a5805b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
DefWindowProcA
GetWindowThreadProcessId
CreateDialogIndirectParamA
GetForegroundWindow
DispatchMessageA
GetSysColorBrush
GetClassInfoExA
EnumWindows
CallNextHookEx
GetWindowLongA
GetClientRect
ReleaseDC
GetWindowRect
DialogBoxIndirectParamA
CreatePopupMenu
gdi32
CreateSolidBrush
GetBkColor
CreatePatternBrush
ole32
OleUninitialize
CoInitialize
CLSIDFromString
CoCreateInstance
OleInitialize
kernel32
GetLocaleInfoW
HeapSize
ReadFile
SetEndOfFile
LCMapStringW
CompareStringA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetTimeZoneInformation
GetSystemInfo
CompareStringW
SetEnvironmentVariableA
LCMapStringA
TlsGetValue
LoadLibraryA
CreateFileA
FlushFileBuffers
SetStdHandle
GetOEMCP
GetACP
WriteConsoleW
VirtualProtect
LoadLibraryExA
AddAtomA
GetNativeSystemInfo
ExpandEnvironmentStringsA
GetDriveTypeA
GetVolumeInformationA
HeapAlloc
GetModuleHandleA
GetCommandLineA
GetVersionExA
DeleteCriticalSection
LeaveCriticalSection
FatalAppExitA
EnterCriticalSection
HeapDestroy
HeapCreate
VirtualFree
HeapFree
VirtualAlloc
HeapReAlloc
IsBadWritePtr
TlsAlloc
SetLastError
GetCurrentThreadId
GetLastError
GetCurrentThread
TlsFree
TlsSetValue
GetProcAddress
CloseHandle
WriteFile
SetFilePointer
ExitProcess
TerminateProcess
GetCurrentProcess
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
InitializeCriticalSection
RtlUnwind
InterlockedExchange
VirtualQuery
GetStringTypeA
MultiByteToWideChar
GetStringTypeW
GetTimeFormatA
GetDateFormatA
GetCPInfo
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
Sections
.text Size: 76KB - Virtual size: 75KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 104KB - Virtual size: 102KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 72KB - Virtual size: 313KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ