Static task
static1
Behavioral task
behavioral1
Sample
a40e018c6522b4123aa41dae62639b3122aeca081596bf9aa330c58f04ce11c6.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a40e018c6522b4123aa41dae62639b3122aeca081596bf9aa330c58f04ce11c6.exe
Resource
win10v2004-20220812-en
General
-
Target
a40e018c6522b4123aa41dae62639b3122aeca081596bf9aa330c58f04ce11c6
-
Size
191KB
-
MD5
634ad647823f7223f874863041207237
-
SHA1
bc153ef65ad52012d95cc32d91b9934efd429fe1
-
SHA256
a40e018c6522b4123aa41dae62639b3122aeca081596bf9aa330c58f04ce11c6
-
SHA512
df2cc3d7875a325ff63a2a4fdd1309c8572e4b59598319be32d8984e49aa0b81937c1a78b5bfe1601198c700602e5781177631cf09ad03c6b7dc335bc2a36052
-
SSDEEP
3072:mQk3DH+bK+snWjvUJCsgYG6vY009Wk6txi0qMhojWZCmILoTqyOtCrU7bv3mDKK:mQkTH+bpsnWjvNYRn09qtE4yjWlILm4U
Malware Config
Signatures
Files
-
a40e018c6522b4123aa41dae62639b3122aeca081596bf9aa330c58f04ce11c6.exe windows x86
938a18a21e100b7f200541d3ee5db6b7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_controlfp
??1type_info@@UAE@XZ
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
strncmp
tolower
malloc
_ftol
rand
srand
memset
__CxxFrameHandler
memmove
_itoa
_strupr
_except_handler3
kernel32
GetCurrentProcess
RaiseException
InterlockedExchange
LocalAlloc
FreeLibrary
GetStartupInfoA
GetFileAttributesA
SetFileAttributesA
DeleteFileA
CreateDirectoryA
CreateToolhelp32Snapshot
Process32First
lstrcmpiA
Process32Next
GetModuleFileNameA
GetCurrentThreadId
GetCommandLineA
SetUnhandledExceptionFilter
CreateThread
GetExitCodeThread
ExitThread
IsBadReadPtr
SleepEx
SetEnvironmentVariableA
GetSystemDirectoryA
ExitProcess
GetTickCount
IsBadWritePtr
GetProcAddress
GetModuleHandleA
GetLastError
Sleep
LoadLibraryA
GetCurrentDirectoryA
GetTempPathA
CloseHandle
WriteFile
SetFilePointer
CreateFileA
WaitForSingleObject
CreateEventA
ExpandEnvironmentStringsA
user32
FlashWindow
GetActiveWindow
wsprintfA
shlwapi
PathFileExistsA
SHDeleteKeyA
SHCopyKeyA
SHGetValueA
ws2_32
getprotobynumber
closesocket
Sections
CODE Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 164KB - Virtual size: 166KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ