Static task
static1
Behavioral task
behavioral1
Sample
52ad5b67e7bc064f0dfe175dde6f20424ad68f80e34cfdecece28bceff275503.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
52ad5b67e7bc064f0dfe175dde6f20424ad68f80e34cfdecece28bceff275503.exe
Resource
win10v2004-20220812-en
General
-
Target
52ad5b67e7bc064f0dfe175dde6f20424ad68f80e34cfdecece28bceff275503
-
Size
372KB
-
MD5
479a9d239053d8ea25da46a2b3e0cd05
-
SHA1
b0cc3ad4d107e800072d87090ffed3222905b711
-
SHA256
52ad5b67e7bc064f0dfe175dde6f20424ad68f80e34cfdecece28bceff275503
-
SHA512
4ea5f9f66f6b1a818584245c87124bb5c8e5a2c23069f8a77d9418737d565356530ea3d3e1ca2218c34a6aaf00e62bae06f18b259fe3486d8ccc727362dea5f4
-
SSDEEP
6144:Ouy0RLMtltGGwByndCdKyG4WbEmXb1C08DX9FwT5L3EeJwOPASaWlcUyqoU2Nq+0:OuhLElIByAdjA3pC08DXwT5L0e9A8cUa
Malware Config
Signatures
Files
-
52ad5b67e7bc064f0dfe175dde6f20424ad68f80e34cfdecece28bceff275503.exe windows x86
2dc3fa03e563fd9c27b2711eb7860369
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
InitCommonControlsEx
ImageList_DragEnter
CreatePropertySheetPage
ImageList_BeginDrag
ImageList_Read
ImageList_Write
ImageList_GetImageRect
ImageList_EndDrag
user32
SystemParametersInfoW
IsWindow
ShowWindow
IsDialogMessageW
RegisterClassA
LockWindowUpdate
CopyAcceleratorTableW
FindWindowExA
MessageBoxA
CreateWindowExA
DestroyWindow
CopyRect
RegisterClassExA
GetClassWord
PaintDesktop
DefWindowProcW
GetDlgItemInt
MenuItemFromPoint
wininet
GopherCreateLocatorA
UnlockUrlCacheEntryFile
SetUrlCacheEntryInfoA
InternetCombineUrlA
comdlg32
ChooseColorW
ChooseFontW
GetOpenFileNameW
shell32
DragQueryFileA
SHGetFileInfo
SHAppBarMessage
kernel32
FreeEnvironmentStringsA
HeapAlloc
SetEnvironmentVariableA
GetStartupInfoW
HeapSize
OpenMutexA
lstrcmpi
GetOEMCP
CopyFileExA
GetStdHandle
GetCPInfo
lstrlenA
SetFilePointer
MultiByteToWideChar
GetTimeZoneInformation
WideCharToMultiByte
TerminateProcess
GetStringTypeA
GetLocaleInfoW
CompareStringA
GetUserDefaultLCID
EnterCriticalSection
GetStartupInfoA
GetCommandLineA
PulseEvent
IsValidCodePage
IsBadWritePtr
GetCurrentThread
GetModuleFileNameW
GetCurrentProcess
GetCommandLineW
FindFirstFileExW
GetLocaleInfoA
LCMapStringA
GetCurrentProcessId
GetDiskFreeSpaceW
TlsAlloc
GetEnvironmentStrings
HeapDestroy
VirtualFree
VirtualAlloc
SetCriticalSectionSpinCount
TlsSetValue
RtlUnwind
SetConsoleCtrlHandler
GetCurrentThreadId
GetStringTypeW
SetThreadLocale
GetLogicalDriveStringsA
GetModuleFileNameA
VirtualProtect
FlushFileBuffers
LoadLibraryA
SetStdHandle
InterlockedExchange
WriteFileEx
IsValidLocale
SetLastError
GetACP
TlsFree
GetVersionExA
TlsGetValue
GetFileType
HeapReAlloc
QueryPerformanceCounter
VirtualQuery
GetTimeFormatA
GetPrivateProfileSectionA
DeleteCriticalSection
FreeEnvironmentStringsW
GlobalFlags
FileTimeToSystemTime
GetSystemTimeAsFileTime
LeaveCriticalSection
GetLastError
GetModuleHandleA
EnumSystemLocalesA
CreateWaitableTimerA
CloseHandle
ExitProcess
InitializeCriticalSection
HeapFree
GetSystemInfo
GetDateFormatA
GetTickCount
GetProcAddress
LCMapStringW
WaitForMultipleObjects
GetFileAttributesExW
GetEnvironmentStringsW
CompareStringW
HeapCreate
WriteFile
UnhandledExceptionFilter
GetDiskFreeSpaceExW
OpenFile
SetHandleCount
ReadFile
GlobalReAlloc
CreateMutexA
Sections
.text Size: 142KB - Virtual size: 142KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 113KB - Virtual size: 141KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 96KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 19KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ