Static task
static1
Behavioral task
behavioral1
Sample
52E27A4EBEE3E1493A18018565B505353E84EB5FCDDE9.exe
Resource
win7-20220901-en
General
-
Target
52E27A4EBEE3E1493A18018565B505353E84EB5FCDDE9.exe
-
Size
276KB
-
MD5
abde7b0ebac2e5962cc6b2bfab4f3663
-
SHA1
9a350711568ea98fd6e105fc013fed415d87a77d
-
SHA256
52e27a4ebee3e1493a18018565b505353e84eb5fcdde94131f0c29507ff82627
-
SHA512
e46434c12a954e997c37257c811e47bb5dd2c405e3090ed7d73b583b0b10866134ebfc21a4fac427d140f9ab77b9ee18d1f8afce3ef19370d37ad480c1a0d0d9
-
SSDEEP
6144:kU3ZJs6g11WYbJRr+5Yp2OC/OrJ/odREGtB/zLc9/:L3wEYbr+qpQWr6PrB/zLs
Malware Config
Signatures
Files
-
52E27A4EBEE3E1493A18018565B505353E84EB5FCDDE9.exe.exe windows x86
9f139c656d3eca8a5564558c67b7ab7d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CopyFileExA
ReadConsoleOutputCharacterA
FlushConsoleInputBuffer
UnlockFile
GetProfileSectionW
VerifyVersionInfoW
QueryDosDeviceW
OpenThread
SetProcessPriorityBoost
GlobalGetAtomNameW
lstrlenW
FindNextVolumeMountPointW
GetComputerNameExA
GlobalDeleteAtom
WriteConsoleInputW
WriteConsoleInputA
FindResourceW
GetComputerNameExW
OpenEventW
CallNamedPipeW
GetModuleHandleA
GetSystemDirectoryA
GetCurrentDirectoryA
BuildCommDCBAndTimeoutsA
GetProcAddress
GetModuleHandleW
VirtualAlloc
SetMailslotInfo
GetDiskFreeSpaceExW
GlobalGetAtomNameA
WriteConsoleW
GetCommandLineA
VerifyVersionInfoA
CreateJobObjectW
InitializeCriticalSection
GetNumberOfConsoleMouseButtons
FindNextVolumeW
GetOverlappedResult
GetThreadSelectorEntry
LoadLibraryW
GetSystemDefaultLangID
GetConsoleAliasesLengthW
WriteProfileSectionW
AddAtomW
InterlockedIncrement
FindNextFileW
_hread
GetStartupInfoA
CreateMailslotW
WideCharToMultiByte
GetSystemWow64DirectoryW
GetConsoleAliasExesLengthA
WaitForDebugEvent
GetTickCount
LoadLibraryA
GetLastError
GetProfileSectionA
GetDefaultCommConfigW
GetConsoleAliasesLengthA
lstrcpyA
GetComputerNameW
EnumSystemLocalesA
DeleteCriticalSection
FileTimeToLocalFileTime
SearchPathW
LockFile
CreateMutexW
FormatMessageW
InterlockedExchangeAdd
GetConsoleFontSize
GlobalAlloc
GetFileSize
HeapAlloc
GetFileAttributesA
GetSystemWindowsDirectoryW
GetAtomNameW
ReadConsoleInputW
GetPrivateProfileStructA
_hwrite
GetConsoleAliasA
SetWaitableTimer
GetFullPathNameW
PrepareTape
SetCurrentDirectoryW
SetCalendarInfoW
CreateFileA
CloseHandle
HeapSize
EnumDateFormatsA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
DeleteFileA
RaiseException
HeapValidate
IsBadReadPtr
EnterCriticalSection
LeaveCriticalSection
GetModuleFileNameW
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
InterlockedDecrement
GetACP
GetOEMCP
GetCPInfo
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
GetCurrentThreadId
TlsFree
SetLastError
Sleep
ExitProcess
GetModuleFileNameA
WriteFile
GetStdHandle
SetHandleCount
GetFileType
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
HeapDestroy
HeapCreate
HeapFree
VirtualFree
HeapReAlloc
RtlUnwind
InitializeCriticalSectionAndSpinCount
DebugBreak
OutputDebugStringA
OutputDebugStringW
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetFilePointer
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetStdHandle
WriteConsoleA
GetConsoleOutputCP
user32
GetMenuInfo
LoadMenuW
CharUpperW
GetListBoxInfo
GetCursorInfo
advapi32
RevertToSelf
Sections
.text Size: 147KB - Virtual size: 147KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 67KB - Virtual size: 40.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ