Static task
static1
Behavioral task
behavioral1
Sample
402bd0a39ff1c5cd868f51a9d73a8fa27a15e1b11cac1d8284522666059c9c61.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
402bd0a39ff1c5cd868f51a9d73a8fa27a15e1b11cac1d8284522666059c9c61.exe
Resource
win10v2004-20221111-en
General
-
Target
402bd0a39ff1c5cd868f51a9d73a8fa27a15e1b11cac1d8284522666059c9c61
-
Size
1.4MB
-
MD5
eac396bb350601ddcf0492f372eeead6
-
SHA1
7565069e9e6aca2ff8d56c5dfe1b9bf0999a2cc2
-
SHA256
402bd0a39ff1c5cd868f51a9d73a8fa27a15e1b11cac1d8284522666059c9c61
-
SHA512
1894388af66bfb99cb9ba0ac840909b609f579d0a3347e79d9270cd4d679628bc1766ae882a8a2cd7a66be717edc51dbc71c3eb6dc1088983731d5fbe073ac24
-
SSDEEP
24576:wclN4z9xcn0j0FxPcdHCwVZKq2wqZuMdpkTvjeGRWEyOkn003qFe2:1+bgxPcdiw/2MWp+LTWbOk03
Malware Config
Signatures
Files
-
402bd0a39ff1c5cd868f51a9d73a8fa27a15e1b11cac1d8284522666059c9c61.exe windows x86
50484236545cb3a8bc7b22bbee14bd20
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42u
ord3076
ord2971
ord3825
ord3826
ord3820
ord3074
ord4075
ord4621
ord4419
ord3592
ord800
ord641
ord861
ord540
ord324
ord825
ord2354
ord2362
ord4229
ord4847
ord4609
ord4606
ord4604
ord4269
ord6371
ord4480
ord2546
ord2504
ord5727
ord3917
ord1089
ord5193
ord2388
ord3341
ord5296
ord5298
ord4074
ord4692
ord5303
ord5285
ord5710
ord4616
ord4418
ord3733
ord561
ord815
ord6211
ord5297
ord617
ord5208
ord296
ord986
ord520
ord823
ord4154
ord6113
ord2613
ord1131
ord2717
ord1165
ord1817
ord4233
ord4690
ord3053
ord3060
ord6332
ord2502
ord2534
ord5239
ord5736
ord1739
ord5573
ord3167
ord5649
ord4414
ord4947
ord4852
ord4381
ord3449
ord3193
ord6076
ord6171
ord4617
ord4420
ord652
ord338
ord2391
ord4608
ord4607
ord1937
ord4268
ord4583
ord4893
ord5070
ord4335
ord4343
ord4717
ord4884
ord4525
ord4539
ord4537
ord4520
ord4523
ord2980
ord4958
ord4955
ord4103
ord6051
ord1768
ord5236
ord5286
ord3743
ord1719
ord4426
ord560
ord813
ord5256
ord2527
ord1934
ord4582
ord4364
ord4886
ord4526
ord5255
ord3394
ord3729
ord384
ord303
ord686
ord4267
ord538
ord537
ord2857
ord1143
ord2088
ord535
ord3298
ord4120
ord4124
ord858
ord2371
ord1834
ord4237
ord2715
ord2382
ord3054
ord5094
ord5097
ord4298
ord3345
ord5006
ord975
ord5468
ord3398
ord2874
ord2873
ord4146
ord4072
ord5233
ord5278
ord2641
ord1658
ord4430
ord4421
ord807
ord796
ord674
ord527
ord554
ord529
ord366
ord794
ord2486
ord2619
ord2618
ord5996
ord2109
ord4158
ord6617
ord4451
ord5248
ord3476
ord2244
ord4078
ord860
ord922
ord1833
ord4527
ord4334
ord4341
ord4714
ord4883
ord4957
ord4954
ord6050
ord5277
ord1718
ord2083
ord364
ord784
ord4236
ord1841
ord2575
ord4397
ord5249
ord4239
ord3296
ord3905
ord3257
ord3131
ord4459
ord3254
ord3142
ord2977
ord5273
ord2116
ord2438
ord5257
ord1720
ord5059
ord3744
ord6372
ord2047
ord2640
ord4435
ord4831
ord3793
ord5276
ord4347
ord6370
ord5157
ord2377
ord5237
ord4401
ord1767
ord4073
ord6048
ord2506
ord4704
ord4992
ord4370
ord4518
ord5261
ord1569
msvcrt
_controlfp
_onexit
__dllonexit
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
__CxxFrameHandler
memcmp
wcscmp
_exit
_XcptFilter
exit
_wcmdln
__wgetmainargs
_initterm
kernel32
lstrcpynA
GetTickCount
GetSystemTime
lstrlenW
GetShortPathNameW
GetModuleHandleW
MulDiv
FreeLibrary
GetProcAddress
LoadLibraryW
lstrcpyW
lstrcatW
GetStartupInfoW
GetProcessTimes
OpenProcess
HeapReAlloc
GetVersionExA
GetCommandLineW
lstrcmpiW
GetCurrentThreadId
InitializeCriticalSection
GetModuleFileNameW
DeleteCriticalSection
HeapDestroy
user32
UpdateWindow
ScreenToClient
SetActiveWindow
CharNextW
CloseClipboard
GetScrollInfo
EnableWindow
SendMessageW
LoadIconW
SetWindowLongW
GetWindowRect
GetWindowLongW
CheckRadioButton
GetClientRect
gdi32
SelectPalette
GetCharWidthW
GetCharWidthA
GetTextExtentPoint32W
ExtTextOutW
advapi32
RegDeleteValueA
comctl32
ImageList_ReplaceIcon
ole32
CoTaskMemFree
CoCreateInstance
CoRevokeClassObject
CoRegisterClassObject
CoInitialize
CoUninitialize
oleaut32
SysFreeString
LoadTypeLi
RegisterTypeLi
VariantClear
SafeArrayDestroy
SysAllocString
Sections
.text Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE