Static task
static1
Behavioral task
behavioral1
Sample
9428ef85eaae1b7d8de43605fde16f06d3ce7ae5494ebe88c7d7909a54293051.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
9428ef85eaae1b7d8de43605fde16f06d3ce7ae5494ebe88c7d7909a54293051.exe
Resource
win10v2004-20220812-en
General
-
Target
9428ef85eaae1b7d8de43605fde16f06d3ce7ae5494ebe88c7d7909a54293051
-
Size
89KB
-
MD5
40387eacf3f68fd16b652684bb57e347
-
SHA1
ca8f25bf0b88bac4624f8a1be520f9ae45def15d
-
SHA256
9428ef85eaae1b7d8de43605fde16f06d3ce7ae5494ebe88c7d7909a54293051
-
SHA512
148c0c690f11598702135b2a77ee5fd819f24aa65f9ee0866ae78102ac4d7a05c4290a84e976ecfb698dbc9c1dacb10b252688f14e9d2cec5dd6f138e738a17c
-
SSDEEP
1536:qh5InXAG8LDl4xgvRxNf5nHZMom9JPw1T6cnjKC6R:k5InXAG8J4xgZvh5Mom9J66cjK
Malware Config
Signatures
Files
-
9428ef85eaae1b7d8de43605fde16f06d3ce7ae5494ebe88c7d7909a54293051.exe windows x86
6336491544e4cbed678a5b1077ae53f0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHGetFolderPathA
SHGetDiskFreeSpaceA
SHGetFileInfoA
SHGetFileInfoA
user32
CreateIcon
BeginPaint
GetMenuState
GetPropA
GetDC
IsChild
GetMessagePos
IsDialogMessageA
DispatchMessageA
EnableMenuItem
SetWindowTextA
GetClipboardData
GetSubMenu
GetCapture
MessageBoxA
GetMenu
GetScrollInfo
GetParent
FindWindowA
IsWindowEnabled
GetKeyNameTextA
GetMenuItemInfoA
GetIconInfo
SetTimer
GetWindow
DrawIconEx
GetFocus
EndPaint
BeginDeferWindowPos
FillRect
EnableWindow
DrawMenuBar
GetClassLongA
GetMenuItemID
EnumChildWindows
TrackPopupMenu
GetWindowTextA
GetCursor
CharLowerBuffA
GetClientRect
IsMenu
IsWindowVisible
CreateMenu
CallWindowProcA
DrawIcon
GetDlgItem
GetScrollPos
ole32
CoCreateFreeThreadedMarshaler
CoCreateGuid
OleRun
MkParseDisplayName
CoDisconnectObject
StgCreateDocfileOnILockBytes
CoCreateFreeThreadedMarshaler
CreateOleAdviseHolder
WriteClassStm
advapi32
RegQueryValueA
RegEnumKeyExA
RegEnumKeyExA
RegQueryValueA
gdi32
SaveDC
version
VerFindFileA
GetFileVersionInfoA
comdlg32
GetSaveFileNameA
ChooseColorA
GetFileTitleA
GetOpenFileNameA
shlwapi
StrChrA
SHDeleteValueA
PathGetCharTypeA
StrDupA
StrStrA
StrStrIA
StrRChrA
StrCmpCA
SHStrDupA
StrToInt64ExA
kernel32
InitializeCriticalSection
CreateThread
VirtualFree
RaiseException
GetDateFormatA
VirtualQuery
LocalReAlloc
GetStdHandle
SetFilePointer
FreeLibrary
WriteFile
MulDiv
lstrcmpA
GetStartupInfoA
GetCurrentThreadId
GetFileType
SetThreadLocale
HeapAlloc
GetFileAttributesA
LocalFree
GetStringTypeW
GetLastError
GetUserDefaultLCID
lstrcpynA
MoveFileA
GetFullPathNameA
SetHandleCount
GetCommandLineA
lstrcpyA
GetFileSize
HeapFree
FindResourceA
GetModuleFileNameA
ReadFile
WideCharToMultiByte
GetSystemDefaultLangID
GlobalFindAtomA
MoveFileExA
EnterCriticalSection
GetProcessHeap
CreateEventA
WaitForSingleObject
ExitProcess
Sleep
LoadLibraryExA
FindFirstFileA
GetStringTypeA
GetOEMCP
DeleteFileA
GetCPInfo
SetErrorMode
LoadResource
SizeofResource
HeapDestroy
lstrlenA
SetEndOfFile
GetThreadLocale
SetLastError
GetLocalTime
SetEvent
CompareStringA
EnumCalendarInfoA
GetLocaleInfoA
LoadLibraryA
lstrcmpiA
LocalAlloc
GetVersionExA
VirtualAlloc
GetProcAddress
FormatMessageA
ExitThread
GetModuleHandleA
ResetEvent
GetDiskFreeSpaceA
GetEnvironmentStrings
GetCurrentThread
GlobalAddAtomA
GetCurrentProcess
GetACP
GlobalDeleteAtom
GetVersion
GlobalAlloc
DeleteCriticalSection
FreeResource
GetCurrentProcessId
CloseHandle
msvcrt
_amsg_exit
sprintf
time
memcpy
wcsncmp
atol
mbstowcs
_chsize
_stat
__set_app_type
_wfopen
Sections
.text Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
DATA Size: 67KB - Virtual size: 90KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.init Size: 1024B - Virtual size: 541B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 571B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ