Static task
static1
Behavioral task
behavioral1
Sample
40d7b255738a3d93e58fd07f1f4b84c8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
40d7b255738a3d93e58fd07f1f4b84c8.exe
Resource
win10v2004-20231215-en
General
-
Target
40d7b255738a3d93e58fd07f1f4b84c8
-
Size
461KB
-
MD5
40d7b255738a3d93e58fd07f1f4b84c8
-
SHA1
a8bd60afbb0fe1194704ef2a037dd0b9fcff481b
-
SHA256
056c49c03febcdb9702bc690eb5cdb980652247679a45f1bf7c5db31994408cf
-
SHA512
f929c45478a522bcbaef593fc663dd8845b7bcd1aac7ac9e2687c17ec427a24f783b65b333ca1961b15fdbdcf8cac1a6f1f0d9f370b7494abf3905a0775df25e
-
SSDEEP
12288:RvEQAnpHjKKbBCC1skLiMYuY1X7FtE/9GQgrB:R87pHzbkC1JuTuY1X7FtE/oQgrB
Malware Config
Signatures
Files
-
40d7b255738a3d93e58fd07f1f4b84c8.exe windows:4 windows x86 arch:x86
ca619829266f5a4e32bafab500a15737
Code Sign
e7:21:6d:48:ed:bf:a9:9b:7a:10:bf:4c:10:c1:03:7c:55:76:c4:58Signer
Actual PE Digeste7:21:6d:48:ed:bf:a9:9b:7a:10:bf:4c:10:c1:03:7c:55:76:c4:58Digest Algorithmsha1PE Digest MatchestrueHeaders
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ord17
kernel32
LockResource
ExitProcess
VirtualAlloc
ReadFile
GetModuleHandleW
GetLastError
CreateFileMappingA
QueryPerformanceCounter
CloseHandle
FreeResource
FreeLibrary
FindResourceA
FindFirstFileA
FindClose
FileTimeToLocalFileTime
SetErrorMode
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
GetVersion
LoadLibraryA
GetOEMCP
GetACP
GetCPInfo
FlushFileBuffers
SetStdHandle
HeapReAlloc
HeapAlloc
RtlUnwind
VirtualFree
HeapCreate
HeapDestroy
GetEnvironmentVariableA
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetModuleFileNameA
UnhandledExceptionFilter
GetCurrentProcess
SetFilePointer
TerminateProcess
HeapFree
GetDefaultCommConfigA
GetTickCount
lstrcmpiA
GetCommandLineW
GetStartupInfoA
GetSystemTimeAsFileTime
GetModuleHandleA
GetCommandLineA
GetProcAddress
GetVersionExA
CreateThread
GetUserDefaultLangID
WriteFile
MultiByteToWideChar
user32
GetSystemMetrics
MessageBoxA
GetDC
GetClassInfoA
GetCapture
IntersectRect
GetWindowThreadProcessId
RegisterClassW
GetSystemMenu
GetWindowLongA
IsChild
IsDialogMessageA
IsIconic
IsRectEmpty
IsWindow
RemovePropA
SetMenu
SetMenuItemInfoA
SetPropA
SetRect
SetScrollInfo
GetWindowPlacement
GetWindowRect
GetClassNameA
GetKeyboardType
GetScrollPos
PtInRect
LoadStringA
GetClientRect
DialogBoxParamA
RegisterClassExA
CreateDialogParamA
CreateWindowExA
InvalidateRect
gdi32
Rectangle
TextOutW
CreatePen
CreatePenIndirect
GetClipBox
ExcludeClipRect
GetDeviceCaps
SetBkColor
advapi32
RegSetValueExW
AllocateLocallyUniqueId
RegCreateKeyExA
RegCloseKey
GetUserNameA
oleaut32
SafeArrayGetUBound
SafeArrayRedim
SafeArrayGetLBound
SafeArrayGetElement
SafeArrayCreate
SysAllocStringLen
SysReAllocStringLen
SafeArrayPutElement
Sections
.text Size: 404KB - Virtual size: 402KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 4KB - Virtual size: 100B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ