Static task
static1
Behavioral task
behavioral1
Sample
52f408638c3a0481adffb0b597acaab28658640b1922146fcdb3ddef2d6e0730.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
52f408638c3a0481adffb0b597acaab28658640b1922146fcdb3ddef2d6e0730.exe
Resource
win10v2004-20220812-en
General
-
Target
52f408638c3a0481adffb0b597acaab28658640b1922146fcdb3ddef2d6e0730
-
Size
153KB
-
MD5
313bcdd1e9880d098f611ed7cfa362c4
-
SHA1
59742592e4df2de908b625c27222e5c9605d8926
-
SHA256
52f408638c3a0481adffb0b597acaab28658640b1922146fcdb3ddef2d6e0730
-
SHA512
585d2d55d9b29106ad591ccfec51d913b89faf941c486dff7c7123de5a3ebdfe7557138a6ceb0d6cb650db2886c20195f578aa45ddf56283d077a123ae64d9be
-
SSDEEP
3072:85mCEWR3kqOCjZCFxfsVF84UaW8NUK7FCAztF1Pc56p7NK:85uWRUOasLt5FCAztFG0K
Malware Config
Signatures
Files
-
52f408638c3a0481adffb0b597acaab28658640b1922146fcdb3ddef2d6e0730.exe windows x86
068ea360dd3b2db44145090a8a2018bf
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegEnumKeyA
RegLoadKeyA
RegQueryValueA
GetUserNameA
ole32
CreateBindCtx
CoUnmarshalInterface
MkParseDisplayName
StgCreateDocfileOnILockBytes
CoReleaseMarshalData
CoGetMalloc
CoFreeUnusedLibraries
shell32
SHGetDesktopFolder
DragQueryFileA
Shell_NotifyIconA
kernel32
lstrcpynA
GetProcAddress
GlobalAddAtomA
GetStringTypeW
LockResource
FindResourceA
GetFileSize
CompareStringA
WideCharToMultiByte
GetOEMCP
LoadResource
HeapAlloc
SetErrorMode
HeapDestroy
FreeResource
LoadLibraryA
FormatMessageA
GetCurrentThread
LocalAlloc
GetCurrentThreadId
ExitThread
SetThreadLocale
GetVersion
GetFileAttributesA
LocalReAlloc
ReadFile
LocalFree
GetCurrentProcessId
lstrlenA
SizeofResource
GlobalFindAtomA
ExitProcess
GetProcessHeap
WriteFile
DeleteCriticalSection
GetEnvironmentStrings
VirtualAllocEx
CreateEventA
GetFileType
Sleep
GetFullPathNameA
GetModuleHandleA
CreateFileA
SetEndOfFile
GetTickCount
LoadLibraryExA
GetDateFormatA
GlobalAlloc
MulDiv
SetLastError
GetStartupInfoA
GetVersionExA
FindClose
SetFilePointer
lstrcatA
GetLastError
RaiseException
lstrcmpA
SetEvent
GetLocalTime
lstrcmpiA
GetStringTypeA
GetThreadLocale
HeapFree
GetDiskFreeSpaceA
oleaut32
VariantCopyInd
SafeArrayUnaccessData
SysAllocStringLen
RegisterTypeLib
SafeArrayCreate
SysReAllocStringLen
SafeArrayPtrOfIndex
user32
GetWindowTextA
GetClientRect
DrawIcon
GetDlgItem
SetCursor
FillRect
GetActiveWindow
GetDC
GetScrollPos
DispatchMessageA
GetIconInfo
GetCursor
HideCaret
GetClassInfoA
CallNextHookEx
SetWindowTextA
GetDesktopWindow
RegisterClassA
GetMenu
GetForegroundWindow
SystemParametersInfoA
IsWindowEnabled
IsChild
GetClassLongA
ShowWindow
GetFocus
DrawFrameControl
CharLowerA
GetKeyNameTextA
GetDCEx
GetClipboardData
BeginPaint
GetCursorPos
GetCapture
gdi32
SaveDC
GetObjectA
CopyEnhMetaFileA
GetRgnBox
SetBkColor
GetDIBits
GetPaletteEntries
msvcrt
acos
strcmp
malloc
memcpy
Sections
.text Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.bss Size: 112KB - Virtual size: 228KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: 1024B - Virtual size: 720B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
DATA Size: 512B - Virtual size: 398B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ