Static task
static1
Behavioral task
behavioral1
Sample
40be03f14e6c6e577ad33ebe3b9bfae4b6f80037a89925434727cc7cff37494e.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
40be03f14e6c6e577ad33ebe3b9bfae4b6f80037a89925434727cc7cff37494e.exe
Resource
win10v2004-20221111-en
General
-
Target
40be03f14e6c6e577ad33ebe3b9bfae4b6f80037a89925434727cc7cff37494e
-
Size
1020KB
-
MD5
ad57c3a0c9d5657725dab9832b69f6d6
-
SHA1
e5a82e0764c197611e373b75aa0814d6dcef81de
-
SHA256
40be03f14e6c6e577ad33ebe3b9bfae4b6f80037a89925434727cc7cff37494e
-
SHA512
0e7011f974f563ede49f1ab03969612b09d48cf2cbe3d3abf765587127298fdf375982f1d2f3bbf06b503495fd84d409be1028ee57ff7b03747d111da4b3f7ee
-
SSDEEP
12288:FYmbZaafVqQHpqG9+S3W9IENKkJcPRMMK613KkR:embZ1f4QHpAS3WdNQPUnk
Malware Config
Signatures
Files
-
40be03f14e6c6e577ad33ebe3b9bfae4b6f80037a89925434727cc7cff37494e.exe windows x86
7614a8450db51792c8f94781ad1a3a89
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateTimerQueueTimer
DeleteFileW
DeleteTimerQueueTimer
DuplicateHandle
FileTimeToLocalFileTime
FileTimeToSystemTime
FindClose
FindFirstFileW
FindNextFileW
FlushFileBuffers
FormatMessageW
GetCommandLineW
GetCurrentDirectoryW
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDateFormatW
GetFileAttributesExW
GetFileAttributesW
GetFileSize
GetFullPathNameW
GetLastError
GetModuleHandleA
GetProcessHeap
GetShortPathNameW
GetStartupInfoA
GetStartupInfoW
CreateThread
GetSystemInfo
GetSystemTimeAsFileTime
GetTickCount
GetTimeFormatW
GetVersionExW
GetWindowsDirectoryW
HeapAlloc
HeapFree
LocalFree
MulDiv
QueryPerformanceCounter
ReadFile
RegisterWaitForSingleObject
SetCurrentDirectoryW
SetEndOfFile
SetFilePointer
SetUnhandledExceptionFilter
SystemTimeToFileTime
TerminateProcess
UnhandledExceptionFilter
UnregisterWait
WriteFile
lstrcatW
lstrcmpW
lstrcpyW
lstrlenW
CreateFileW
CompareStringW
CompareFileTime
CloseHandle
BindIoCompletionCallback
GetDriveTypeA
GetModuleHandleW
VirtualAlloc
GetSystemDirectoryW
CreateFileA
user32
EndPaint
FindWindowW
GetClientRect
GetDlgItem
GetDlgItemTextW
GetParent
GetWindowLongW
GetWindowRect
InvalidateRect
IsDlgButtonChecked
LoadIconW
LoadStringW
MessageBoxW
MoveWindow
PostMessageW
RegisterClassW
ScreenToClient
SendMessageW
EndDialog
SetDlgItemTextW
SetFocus
SetForegroundWindow
SetWindowLongW
ShowWindow
WinHelpW
wsprintfW
CreateWindowExW
ChildWindowFromPoint
CheckRadioButton
CheckDlgButton
CharUpperBuffW
CharLowerBuffW
BeginPaint
LoadCursorW
GetSysColor
LoadCursorA
EnableWindow
DialogBoxParamW
DestroyWindow
DestroyIcon
SetClassLongW
DefWindowProcW
gdi32
SetTextColor
SetTextAlign
SetBkColor
SelectObject
ExtTextOutW
GetTextExtentPoint32W
advapi32
RegOpenKeyExA
RegQueryValueExA
shell32
SHGetFileInfoW
SHGetPathFromIDListW
SHGetSpecialFolderLocation
ShellExecuteW
SHBrowseForFolderW
msvcrt
_XcptFilter
__getmainargs
__p__commode
__p__fmode
__set_app_type
__setusermatherr
_acmdln
_adjust_fdiv
_cexit
_controlfp
_except_handler3
_exit
_initterm
_wcsnicmp
exit
wcsstr
Sections
.text Size: 993KB - Virtual size: 993KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ