Static task
static1
Behavioral task
behavioral1
Sample
40725059ae0f0a1301bc2622c1c4fff6.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
40725059ae0f0a1301bc2622c1c4fff6.exe
Resource
win10v2004-20231215-en
General
-
Target
40725059ae0f0a1301bc2622c1c4fff6
-
Size
159KB
-
MD5
40725059ae0f0a1301bc2622c1c4fff6
-
SHA1
582cfc5be3ce7a2c38b41073510ccbc329c93d4f
-
SHA256
cabfa94a4b7825063e4735909f6a0255ba1b4ce85443e2bf80ee37f34a32a6f0
-
SHA512
f817f04532ef08be247b9443a2d62c7db4db9d55509a03d0e7615a1737fa080301bf8a798a71e2d509e879c0246e7926365b49d48dd99938d1999161b96418b1
-
SSDEEP
3072:FKXFCT/FnSjKSs8RbOtmNzdDCd/Ro0XyEA0lF53r2kAScEF:FSCrdSjK4t0mNzd2/RNCEv3r2ac2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 40725059ae0f0a1301bc2622c1c4fff6
Files
-
40725059ae0f0a1301bc2622c1c4fff6.exe windows:4 windows x86 arch:x86
6eee460f3030d12ee3aeda93e013d95b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExpandEnvironmentStringsW
HeapAlloc
GetCurrentProcess
IsValidCodePage
GetUserDefaultLCID
GetShortPathNameW
VirtualProtect
FileTimeToSystemTime
CreateProcessA
LoadResource
GetOEMCP
GetConsoleOutputCP
GetEnvironmentStringsW
GetModuleHandleA
GetModuleFileNameA
EnumSystemLocalesA
HeapCreate
RaiseException
ExitProcess
HeapReAlloc
LocalFree
LeaveCriticalSection
GetTempFileNameA
GetModuleFileNameW
GlobalSize
CompareStringW
InterlockedDecrement
InterlockedCompareExchange
GetModuleHandleW
ResetEvent
SetConsoleCP
GetProcessHeap
SetLastError
LoadLibraryExW
GetEnvironmentStrings
GetCurrentThreadId
FindResourceA
GetDiskFreeSpaceA
UnhandledExceptionFilter
GetSystemDirectoryA
ResumeThread
DeviceIoControl
GetSystemTime
GetVersion
CreateFileW
CloseHandle
lstrcmpiA
GetTickCount
TlsAlloc
InitializeCriticalSection
GetStdHandle
MulDiv
GetFileType
GetCurrentProcessId
CreateFileA
TlsSetValue
FlushFileBuffers
GetTempFileNameW
GlobalAlloc
QueryPerformanceCounter
InterlockedIncrement
LoadLibraryExA
GetLocalTime
CreateThread
OpenEventW
FindFirstFileA
GetCommandLineA
SetStdHandle
SizeofResource
DeleteCriticalSection
GetSystemTimeAsFileTime
IsDBCSLeadByte
EnterCriticalSection
DisableThreadLibraryCalls
HeapFree
LCMapStringA
GetStartupInfoA
GetProcAddress
IsDebuggerPresent
TerminateProcess
UnmapViewOfFile
GetACP
FindClose
LocalFileTimeToFileTime
VirtualFree
CreateEventW
FreeEnvironmentStringsA
GetLastError
InterlockedExchange
user32
InvalidateRect
GetSubMenu
GetParent
SetFocus
MoveWindow
CharUpperW
GetWindow
UnregisterClassW
SetWindowRgn
DestroyWindow
EndDialog
ScreenToClient
DestroyMenu
EnableMenuItem
SetWindowPos
IsDlgButtonChecked
DispatchMessageW
GetSysColor
LoadStringA
CharNextW
CharUpperA
BeginPaint
LoadIconA
msvcrt
__setusermatherr
_lock
_onexit
??0exception@@QAE@ABV0@@Z
memset
realloc
_vsnprintf
??_U@YAPAXI@Z
__getmainargs
_adjust_fdiv
??1type_info@@UAE@XZ
iswspace
_amsg_exit
_unlock
??0exception@@QAE@ABQBD@Z
_initterm
?terminate@@YAXXZ
malloc
gdi32
DeleteObject
SetBkColor
GetDIBits
SetWindowOrgEx
BitBlt
GetObjectA
StretchBlt
CreatePalette
GetDeviceCaps
CreateCompatibleBitmap
CreateRectRgnIndirect
advapi32
RegCreateKeyExA
RegQueryValueExW
RegOpenKeyExA
RegCloseKey
RegDeleteKeyA
RegOpenKeyExW
RegQueryInfoKeyW
version
GetFileVersionInfoSizeW
rpcrt4
RpcStringFreeA
ole32
CoTaskMemAlloc
Sections
.text Size: 27KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 124KB - Virtual size: 180KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ