Static task
static1
Behavioral task
behavioral1
Sample
40c4035cfecef21fbf5dbacb8467a7bd0d6bd675c67968ea924355aa4e27d5c0.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
40c4035cfecef21fbf5dbacb8467a7bd0d6bd675c67968ea924355aa4e27d5c0.exe
Resource
win10v2004-20220812-en
General
-
Target
40c4035cfecef21fbf5dbacb8467a7bd0d6bd675c67968ea924355aa4e27d5c0
-
Size
297KB
-
MD5
402691d903ec46cb008095e39ae63070
-
SHA1
a8d352bd0ce9be8eb04859a231fd122f61a2151f
-
SHA256
40c4035cfecef21fbf5dbacb8467a7bd0d6bd675c67968ea924355aa4e27d5c0
-
SHA512
60473b1e90d6590c1ab05b7a76a1b10184cb05e9696e8f27e98ea519ba22a7edf0de62fa8be8f8848f2f5b6a70c9db303eabb60003503540214b5666af41e065
-
SSDEEP
6144:tUgyENi4TeqXbB3Y7aETR/od3mBPQXs255L3:tCPwvN3nETR1BIXs2D3
Malware Config
Signatures
Files
-
40c4035cfecef21fbf5dbacb8467a7bd0d6bd675c67968ea924355aa4e27d5c0.exe windows x86
0faa7bad7dc69a9345dab39277a378e2
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
cncs32
ord4
ord69
ord150
ord70
ord159
ord16
ord46
ord47
ord58
ord77
ord6
ord78
ord42
ord64
ord24
ord158
ord81
ord23
ord43
ord120
ord3
ord2
ord33
ord179
ord178
ord30
ord146
ord167
ord176
ord140
ord151
ord104
ord147
ord36
ord89
ord165
ord90
ord141
ord136
ord109
ord163
ord166
ord92
ord94
ord93
ord91
ord52
ord168
ord138
ord56
ord162
ord108
ord19
ord50
ord76
ord68
ord32
ord181
ord180
ord206
ord57
ord35
ord148
ord73
ord83
ord55
ord29
ord137
ord118
ord119
ord117
ord86
ord98
ord61
ord125
ord60
ord132
ord131
ord34
ord80
ord54
ord48
ord133
ord129
ord75
ord143
ord177
ord115
ord149
ord169
ord116
ord66
ord185
ord106
ord171
ord107
ord173
ord172
ord112
ord113
ord114
ord88
ord96
ord160
ord111
ord95
ord161
ord71
ord101
ord18
ord65
ord12
winmm
joyGetPos
timeGetTime
kernel32
GetProcAddress
GlobalSize
GlobalUnlock
GlobalFree
GlobalAddAtomA
GlobalDeleteAtom
GlobalReAlloc
FreeLibrary
SetErrorMode
LoadLibraryA
GlobalLock
GetModuleFileNameA
_lwrite
CreateProcessA
LocalFree
lstrlenA
GetPrivateProfileIntA
GlobalAlloc
lstrcpy
lstrcmp
lstrcat
lstrlen
_hread
FindResourceA
SizeofResource
LoadResource
LockResource
FreeResource
GetTickCount
_llseek
_lread
_lcreat
_lopen
_lclose
LocalAlloc
GetTempPathA
GetTempFileNameA
GetVersion
lstrcpyA
GetExitCodeProcess
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
RtlUnwind
VirtualAlloc
VirtualFree
HeapCreate
HeapDestroy
LCMapStringW
WideCharToMultiByte
LCMapStringA
MultiByteToWideChar
GetCurrentProcess
TerminateProcess
ExitProcess
GetOEMCP
GetACP
GetCPInfo
GetCommandLineA
GetStartupInfoA
GetModuleHandleA
HeapFree
HeapAlloc
HeapReAlloc
SetCurrentDirectoryA
GetCurrentDirectoryA
SetEnvironmentVariableA
DeleteFileA
GetLastError
GetStdHandle
WriteFile
GetStringTypeA
GetStringTypeW
user32
PostQuitMessage
RegisterClassA
RegisterClassExA
CheckRadioButton
LoadImageA
LoadIconA
GetClassNameA
GetTopWindow
SetCapture
GetCursorPos
SetCursorPos
ReleaseCapture
ShowCursor
GetFocus
GetPropA
SetPropA
CallWindowProcA
RemovePropA
GetSystemMetrics
IntersectRect
RedrawWindow
GetUpdateRect
IsDlgButtonChecked
GetActiveWindow
GetWindowRect
IsZoomed
SetWindowPos
GetClientRect
GetWindowLongA
SetWindowLongA
UpdateWindow
LoadMenuIndirectA
LoadMenuA
GetSubMenu
InvalidateRect
ShowWindow
DestroyMenu
GetMenu
wsprintfA
SetWindowTextA
GetMenuItemCount
GetMenuState
DeleteMenu
FillRect
SetMenu
IsIconic
CheckMenuItem
EnableMenuItem
PostMessageA
GetKeyState
SendMessageA
GetWindow
SetForegroundWindow
WinHelpA
BeginPaint
EndPaint
ClientToScreen
PtInRect
GetDC
ScreenToClient
ReleaseDC
GetDlgItem
MapVirtualKeyA
SetTimer
SetDlgItemTextA
KillTimer
SendDlgItemMessageA
GetDlgItemTextA
EndDialog
LoadStringA
MessageBoxA
CopyRect
OffsetRect
GetInputState
PeekMessageA
SetFocus
IsWindowVisible
EnumThreadWindows
GetDesktopWindow
GetAsyncKeyState
gdi32
DeleteObject
GetStockObject
CreateSolidBrush
CreatePalette
SelectObject
LineTo
MoveToEx
Rectangle
CreateHatchBrush
CreatePen
StretchDIBits
SelectPalette
RealizePalette
CreateFontIndirectA
GetObjectA
GetTextExtentPointA
GetDeviceCaps
advapi32
RegQueryValueA
RegOpenKeyA
RegCloseKey
Sections
.text Size: 90KB - Virtual size: 89KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
TEXT_1 Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 948B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 85KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE