Static task
static1
Behavioral task
behavioral1
Sample
8b40be941bb4fff8447601bf20c57fa3644a481ab99f2f3d8cbedabd04d216be.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8b40be941bb4fff8447601bf20c57fa3644a481ab99f2f3d8cbedabd04d216be.exe
Resource
win10v2004-20220901-en
General
-
Target
8b40be941bb4fff8447601bf20c57fa3644a481ab99f2f3d8cbedabd04d216be
-
Size
96KB
-
MD5
6d35c9e45f63daac15330adc64c87cb6
-
SHA1
39beed1e14a163bf951a469c48bd34fa15785060
-
SHA256
8b40be941bb4fff8447601bf20c57fa3644a481ab99f2f3d8cbedabd04d216be
-
SHA512
63e2906f21dd874f3689ddaab94e2a878d75249f5a464a23966b241250293268b866b5d9bf5f3873967a05585b5f97a887680cc3967bf3e11b2dd00d499f7594
-
SSDEEP
1536:l60qhiG+s+eRO+RZ1G2JWnyOo+xDlAygeQG+lZWHxNOFQsF:MbWnyOo+xBnD+GHxNOFQ
Malware Config
Signatures
Files
-
8b40be941bb4fff8447601bf20c57fa3644a481ab99f2f3d8cbedabd04d216be.exe windows x86
31499365956d58e0bff7d737c4bdb9f0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHGetSpecialFolderPathA
wininet
FindNextUrlCacheEntryA
InternetSetOptionA
InternetQueryOptionA
FindFirstUrlCacheEntryA
InternetGetConnectedState
shlwapi
SHDeleteValueA
PathFileExistsA
SHSetValueA
SHGetValueA
user32
GetSystemMetrics
GetWindowTextA
SetWindowTextA
BringWindowToTop
SetActiveWindow
GetForegroundWindow
GetWindowThreadProcessId
SetWindowPos
SetFocus
CharToOemA
FindWindowA
AttachThreadInput
GetCursorPos
SetForegroundWindow
advapi32
RegSetValueExA
RegCloseKey
RegOpenKeyA
msvcp60
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV01@@Z
??1_Lockit@std@@QAE@XZ
??0_Lockit@std@@QAE@XZ
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@ABV?$allocator@D@1@@Z
?_Split@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXXZ
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
??Mstd@@YA_NABV?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@0@0@Z
??0?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@PBDABV?$allocator@D@1@@Z
?_Copy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_Xlen@std@@YAXXZ
?compare@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEHIIPBDI@Z
?erase@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@II@Z
?max_size@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QBEIXZ
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@ABV12@II@Z
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?_Xran@std@@YAXXZ
kernel32
GetStartupInfoA
GetModuleHandleA
WideCharToMultiByte
ReleaseMutex
GetVolumeInformationA
GetVersionExA
lstrlenA
MultiByteToWideChar
lstrlenW
CreateMutexA
OpenProcess
TerminateProcess
Module32First
Module32Next
Process32First
GetTempFileNameA
WaitForSingleObject
CloseHandle
Sleep
CopyFileA
GetTempPathA
GetCurrentThreadId
CreateProcessA
GetTickCount
GetModuleFileNameA
GetLastError
GetCurrentProcessId
CreateDirectoryA
GetWindowsDirectoryA
Process32Next
CreateToolhelp32Snapshot
DeleteFileA
GetSystemTimeAsFileTime
ole32
CoInitialize
CoCreateInstance
CLSIDFromProgID
oleaut32
SafeArrayCreateVector
SafeArrayAccessData
SafeArrayUnaccessData
SafeArrayDestroy
SysAllocString
VariantClear
SysFreeString
SysStringLen
SysAllocStringLen
msvcrt
_beginthread
??1exception@@UAE@XZ
wcscmp
strncpy
strchr
strtok
strtol
fgets
sscanf
??1type_info@@UAE@XZ
__dllonexit
_onexit
_exit
_XcptFilter
_ltoa
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
_strlwr
_strdup
_itoa
atol
printf
time
srand
rand
strncmp
fwrite
atoi
fprintf
fscanf
memmove
??2@YAPAXI@Z
fopen
fseek
free
strstr
malloc
__CxxFrameHandler
sprintf
fclose
fread
ftell
Sections
.text Size: 84KB - Virtual size: 84KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE