Static task
static1
Behavioral task
behavioral1
Sample
40fad3db346202b29fa8302bb3545740.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
40fad3db346202b29fa8302bb3545740.exe
Resource
win10v2004-20231222-en
General
-
Target
40fad3db346202b29fa8302bb3545740
-
Size
232KB
-
MD5
40fad3db346202b29fa8302bb3545740
-
SHA1
417a08c02b049fe9ec090f4ed245d377004ca6cb
-
SHA256
e2396a781fdf21e3dca155249019f223dc2864aa9835a94c27233f4c62b34575
-
SHA512
393b35fd516b1accce7b9169b6ec1124752fc0b7d316783963e7d2eacf62c1651f4af085d02cc0d2da8fc3c8ce209157261106c66c211bc8fc79f6146a558178
-
SSDEEP
6144:L8ng5jqur/lO7bEGhlw9t/L2y+STX29KE:Qsr/KIUlwvJLM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 40fad3db346202b29fa8302bb3545740
Files
-
40fad3db346202b29fa8302bb3545740.exe windows:4 windows x86 arch:x86
838fa111bf3eabe1ee20a6550853df0a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHFileOperationW
SHGetSpecialFolderPathW
ShellExecuteW
wininet
InternetConnectW
InternetCloseHandle
HttpOpenRequestW
HttpSendRequestW
InternetOpenW
shlwapi
PathIsDirectoryW
PathFindFileNameW
SHDeleteValueW
SHSetValueW
SHGetValueW
SHDeleteKeyW
PathFileExistsW
PathAppendW
PathFindExtensionW
PathRemoveExtensionW
kernel32
LeaveCriticalSection
TlsGetValue
EnterCriticalSection
GlobalReAlloc
GlobalHandle
InitializeCriticalSection
TlsAlloc
TlsSetValue
LocalReAlloc
DeleteCriticalSection
TlsFree
WriteFile
SetFilePointer
FlushFileBuffers
GetCurrentProcess
GetFullPathNameW
GetVersionExA
LoadLibraryA
CompareStringW
GlobalFindAtomW
WritePrivateProfileStringW
GlobalFlags
GetModuleHandleA
SetErrorMode
LocalAlloc
HeapFree
HeapAlloc
GetProcessHeap
GetStartupInfoW
ExitProcess
GetSystemTimeAsFileTime
HeapReAlloc
RtlUnwind
RaiseException
HeapSize
SetUnhandledExceptionFilter
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
SetHandleCount
GetFileType
GetStartupInfoA
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
UnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
VirtualAlloc
LCMapStringA
LCMapStringW
GetTimeZoneInformation
GetConsoleCP
GetConsoleMode
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
GetCurrentDirectoryA
GetDriveTypeA
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
SetEnvironmentVariableA
InterlockedDecrement
InterlockedIncrement
GetThreadLocale
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
GetVersion
EnumResourceLanguagesW
GetLocaleInfoW
LoadLibraryW
CompareStringA
InterlockedExchange
lstrcmpW
FreeLibrary
GlobalDeleteAtom
GetModuleHandleW
GetProcAddress
FindFirstFileW
FileTimeToLocalFileTime
FileTimeToSystemTime
FindNextFileW
FindClose
GlobalAddAtomW
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageW
LocalFree
lstrlenW
SizeofResource
GetVersionExW
LoadResource
FindResourceW
RemoveDirectoryW
CreateMutexW
MoveFileExW
TerminateProcess
DeleteFileW
OpenProcess
Process32NextW
GetExitCodeProcess
Process32FirstW
CreateToolhelp32Snapshot
WideCharToMultiByte
lstrcmpiW
Sleep
ReleaseMutex
GetCommandLineW
SetCurrentDirectoryW
CopyFileW
GetModuleFileNameW
GetTempPathW
GetFileSize
LockResource
GetLastError
SetLastError
MultiByteToWideChar
CloseHandle
ReadFile
CreateFileW
user32
GrayStringW
UnregisterClassW
DestroyMenu
SetPropW
GetPropW
RemovePropW
GetForegroundWindow
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
GetClientRect
GetMenu
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
CopyRect
PtInRect
DefWindowProcW
CallWindowProcW
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
SetWindowPos
ShowWindow
SetWindowLongW
GetDlgCtrlID
IsWindow
SetWindowTextW
DrawTextExW
GetDlgItem
SetForegroundWindow
IsIconic
UnhookWindowsHookEx
LoadCursorW
GetSystemMetrics
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
SetWindowsHookExW
CallNextHookEx
GetMessageW
TranslateMessage
DispatchMessageW
IsWindowVisible
GetKeyState
PeekMessageW
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapW
GetFocus
ModifyMenuW
EnableMenuItem
CheckMenuItem
GetWindowThreadProcessId
GetParent
GetWindowLongW
GetLastActivePopup
IsWindowEnabled
EnableWindow
PostQuitMessage
SetCursor
SendMessageW
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
wsprintfW
RegisterWindowMessageW
EnumWindows
SendMessageTimeoutW
PostMessageW
FindWindowExW
GetWindowTextW
GetWindow
GetDesktopWindow
MessageBoxW
DrawTextW
TabbedTextOutW
ClientToScreen
LoadIconW
WinHelpW
GetCapture
GetClassLongW
GetClassNameW
GetActiveWindow
UnregisterClassA
gdi32
SetMapMode
SelectObject
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
GetStockObject
ExtTextOutW
TextOutW
RectVisible
PtVisible
RestoreDC
SaveDC
DeleteObject
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
GetDeviceCaps
Escape
winspool.drv
OpenPrinterW
ClosePrinter
DocumentPropertiesW
advapi32
RegCreateKeyExW
RegQueryValueW
RegEnumKeyW
RegDeleteKeyW
RegOpenKeyW
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
RegSetValueExW
oleaut32
VariantClear
VariantChangeType
VariantInit
Sections
.text Size: 172KB - Virtual size: 169KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ