Static task
static1
Behavioral task
behavioral1
Sample
52f3cd1edc11386583fd0f1799487375acdd71a5b75d1639e9639d9378c12360.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
52f3cd1edc11386583fd0f1799487375acdd71a5b75d1639e9639d9378c12360.exe
Resource
win10v2004-20220812-en
General
-
Target
52f3cd1edc11386583fd0f1799487375acdd71a5b75d1639e9639d9378c12360
-
Size
56KB
-
MD5
0c897c57b482cc29070d7a9ca79b496b
-
SHA1
fa332d16750d1d028089c5d41ed6f831f082205f
-
SHA256
52f3cd1edc11386583fd0f1799487375acdd71a5b75d1639e9639d9378c12360
-
SHA512
8259bc949f0321755cf388dcdeb3c31970137dc95ee6e4ef8165fd331ecc0e72d7abd99182cd61151ff9256fb06f2a12df94283fc16193c33acd5953dca04d79
-
SSDEEP
1536:yr/2FKrQq/ibyx6G56K3oCS0b5aVMsjE0I0AvmIWM9S9vdTIW7SyRwCqSNks5zBG:wW8SlW0mvl5f
Malware Config
Signatures
Files
-
52f3cd1edc11386583fd0f1799487375acdd71a5b75d1639e9639d9378c12360.exe windows x86
f51ad857971e2c3f2189808c855622f5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProfileSectionW
SetThreadLocale
GetTickCount
GetTempFileNameA
Process32Next
ExitThread
ConvertFiberToThread
GetLogicalDrives
EnumSystemLocalesW
GetNumaAvailableMemoryNode
ReadFile
Sections
.text Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
rdata Size: - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE