Static task
static1
Behavioral task
behavioral1
Sample
840cf0ab471950f620a448333380edd44b4aad1b039b0f8275d257adcb169f12.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
840cf0ab471950f620a448333380edd44b4aad1b039b0f8275d257adcb169f12.exe
Resource
win10v2004-20220901-en
General
-
Target
840cf0ab471950f620a448333380edd44b4aad1b039b0f8275d257adcb169f12
-
Size
209KB
-
MD5
f918f6d05f4f8bd9c506354c72ead53a
-
SHA1
950bb7538b5b336679fd62ff94128a24637adbdc
-
SHA256
840cf0ab471950f620a448333380edd44b4aad1b039b0f8275d257adcb169f12
-
SHA512
4bb01aaf7c6b73a948995e96bb5f74b8db8611b1c73a35e1be355f8937cad122f0d091f6a009799f47e4f7df4991427e6dd25ca5987bca731e96c5caf6f6537c
-
SSDEEP
3072:lTRtrST7g9MfLrAnahaMAvO3Zffh8VZ1uF9hnQTBf/2NAP9UlNyJm5Xh:lTO/1L8ahPI0VaSF7QTBnO5x
Malware Config
Signatures
Files
-
840cf0ab471950f620a448333380edd44b4aad1b039b0f8275d257adcb169f12.exe windows x86
0344bf56adc59dedc60ab9bd37dd35e9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentThreadId
InterlockedDecrement
RaiseException
InterlockedIncrement
GlobalReAlloc
GlobalHandle
TlsGetValue
TlsAlloc
TlsSetValue
LocalReAlloc
TlsFree
lstrcmpA
FlushFileBuffers
GetCurrentProcess
GetFullPathNameA
GlobalFlags
GetCPInfo
GetOEMCP
GetCurrentDirectoryA
ExitProcess
RtlUnwind
ExitThread
CreateThread
TerminateProcess
GlobalGetAtomNameA
HeapFree
VirtualProtect
VirtualAlloc
GetTimeFormatA
GetDateFormatA
GetStartupInfoA
GetCommandLineA
HeapReAlloc
SetStdHandle
GetFileType
HeapSize
LCMapStringA
LCMapStringW
QueryPerformanceCounter
GetCurrentProcessId
UnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
GetTimeZoneInformation
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetDriveTypeA
IsBadCodePtr
SetEnvironmentVariableA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcatA
lstrcmpW
GetModuleHandleA
FileTimeToSystemTime
GlobalLock
GlobalUnlock
FormatMessageA
GetLongPathNameA
SetFileAttributesA
CopyFileA
GetPrivateProfileIntA
CreateProcessA
SetUnhandledExceptionFilter
IsBadReadPtr
VirtualQuery
GetFileTime
GetSystemTimeAsFileTime
GetSystemInfo
GlobalMemoryStatus
FileTimeToLocalFileTime
FileTimeToDosDateTime
WritePrivateProfileStringA
GetPrivateProfileStringA
CompareStringW
CompareStringA
lstrcmpiA
GetVersion
LoadLibraryA
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
GlobalAlloc
GlobalFree
MultiByteToWideChar
lstrcpynA
LoadLibraryExA
GetProcAddress
FreeLibrary
GetTickCount
CreateFileA
FindFirstFileA
DeleteFileA
FindNextFileA
FindClose
RemoveDirectoryA
CreateDirectoryA
GetModuleFileNameA
LockFile
WriteFile
UnlockFile
ReadFile
GetFileSize
SetFilePointer
SetEndOfFile
GetFileAttributesA
lstrcpyA
LocalFree
LocalAlloc
lstrlenA
SetEvent
TerminateThread
SetLastError
GetExitCodeThread
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
WaitForSingleObject
Sleep
CreateEventA
GetLastError
CloseHandle
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
HeapAlloc
user32
ValidateRect
ClientToScreen
SetMenuItemBitmaps
ModifyMenuA
EnableMenuItem
CheckMenuItem
GetMenuCheckMarkDimensions
LoadBitmapA
GetDC
ReleaseDC
GetSysColorBrush
IsWindowEnabled
SetWindowTextA
RegisterWindowMessageA
WinHelpA
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassInfoExA
SetPropA
GetPropA
RemovePropA
GetFocus
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
GetDlgItem
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
TrackPopupMenu
GetKeyState
EnableWindow
SetForegroundWindow
GetClientRect
GetMenu
GetSysColor
AdjustWindowRectEx
GetParent
PostMessageA
DispatchMessageA
PeekMessageA
wsprintfA
SetDlgItemTextA
SendDlgItemMessageA
UpdateWindow
GetClassInfoA
RegisterClassA
UnregisterClassA
GetDlgCtrlID
CallWindowProcA
GetWindowLongA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetSystemMetrics
CopyRect
PtInRect
GetWindow
GetMenuState
TabbedTextOutA
DrawTextA
DrawTextExA
GrayStringA
GetMenuItemID
LoadIconA
ShowWindow
CreateWindowExA
EndDialog
GetSubMenu
DestroyMenu
GetCursorPos
LoadMenuA
PostQuitMessage
EndPaint
BeginPaint
DestroyWindow
MessageBoxA
DialogBoxParamA
GetDesktopWindow
DefWindowProcA
RegisterClassExA
LoadCursorA
GetMessageA
TranslateMessage
TranslateAcceleratorA
LoadAcceleratorsA
LoadStringA
SendMessageA
GetMenuItemCount
GetClassNameA
gdi32
GetStockObject
DeleteDC
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
TextOutA
GetDeviceCaps
PtVisible
SetMapMode
RestoreDC
SaveDC
DeleteObject
CreateBitmap
ExtTextOutA
SetBkColor
SetTextColor
GetClipBox
RectVisible
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
GetUserNameA
RegCloseKey
RegEnumValueA
RegQueryInfoKeyA
RegOpenKeyA
RegQueryValueExA
shell32
SHGetSpecialFolderLocation
SHGetMalloc
SHGetPathFromIDListA
comctl32
ord17
shlwapi
UrlUnescapeA
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
ws2_32
socket
inet_addr
closesocket
shutdown
setsockopt
connect
gethostbyname
htons
wininet
InternetReadFile
HttpQueryInfoA
InternetOpenUrlA
InternetCloseHandle
InternetOpenA
InternetGetConnectedState
InternetCrackUrlA
InternetCanonicalizeUrlA
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 140KB - Virtual size: 138KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.CHONG Size: 4KB - Virtual size: 155B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE