Static task
static1
Behavioral task
behavioral1
Sample
52bb768143c230ffd504a526d0bd59548e0a4df2845e94573235479fbe09970f.exe
Resource
win7-20220812-en
General
-
Target
52bb768143c230ffd504a526d0bd59548e0a4df2845e94573235479fbe09970f
-
Size
309KB
-
MD5
3b10b04eb226d30b7df50ef99cd39710
-
SHA1
cf035099bcc0730ceef53682ab5c543ca8a328a3
-
SHA256
52bb768143c230ffd504a526d0bd59548e0a4df2845e94573235479fbe09970f
-
SHA512
471803a18eca7b221e5e654dbd7d20a26a89ee0d38c5feda5b1aad385ed02275dbb20296eec7a94660b5141689f073a28e8cfdad3200a62a639cdb3c9d2dc981
-
SSDEEP
3072:s19PZVcPhN3AX6gTuO3O51ZrZSYi4uMq5pKC7BtGrB8uQIq85T7Jp21jQFNSN4lI:sFCOMZrZ1sRIq85T1WcX7OPmFNu
Malware Config
Signatures
Files
-
52bb768143c230ffd504a526d0bd59548e0a4df2845e94573235479fbe09970f.exe windows x86
7525183fd1efae7856d4d367e40f4805
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetFileType
GetStartupInfoA
DeleteCriticalSection
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
InterlockedDecrement
GetCurrentThreadId
HeapDestroy
HeapCreate
VirtualFree
HeapFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
HeapReAlloc
HeapAlloc
HeapSize
LeaveCriticalSection
EnterCriticalSection
OutputDebugStringA
FreeLibrary
LoadLibraryA
InitializeCriticalSection
GetModuleHandleW
GetCPInfo
GetACP
GetOEMCP
Sleep
VirtualAlloc
RtlUnwind
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
SetHandleCount
WideCharToMultiByte
LCMapStringW
VirtualProtect
GetSystemInfo
VirtualQuery
lstrlenW
DeleteFileW
FindClose
FindFirstFileW
CloseHandle
LoadLibraryW
CreateProcessW
GetPrivateProfileIntW
ReleaseSemaphore
WaitForSingleObject
GetPrivateProfileStringW
GetVersionExW
CreateSemaphoreW
GetSystemDirectoryW
GetProcessHeap
CreateMutexW
ReleaseMutex
GetTempPathW
GetCommandLineW
GetCommandLineA
GetEnvironmentStringsW
GetLastError
FreeEnvironmentStringsW
GetEnvironmentStrings
MultiByteToWideChar
FreeEnvironmentStringsA
GetModuleFileNameW
GetModuleFileNameA
GetStdHandle
WriteFile
GlobalAlloc
GetFileSize
GlobalFree
GetPrivateProfileSectionW
OpenFileMappingW
lstrcmpiW
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
LocalAlloc
GetTempFileNameW
OutputDebugStringW
LocalFree
lstrlenA
CreateFileA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
FlushFileBuffers
SetEndOfFile
GetConsoleMode
GetConsoleCP
SetFilePointer
SetStdHandle
CreateFileW
ReadFile
CreateThread
ExitThread
RaiseException
ExitProcess
GetModuleHandleA
GetProcAddress
SetUnhandledExceptionFilter
GetStartupInfoW
GetVersionExA
GetUserDefaultLangID
FindFirstFileA
GetPrivateProfileStringA
lstrcmpiA
LCMapStringA
user32
DispatchMessageW
TranslateMessage
GetMessageW
IsWindow
GetWindowTextW
SetWindowTextW
DrawIconEx
LoadMenuW
ModifyMenuW
GetMenuItemInfoW
SetMenuItemInfoW
RegisterClassW
CreateWindowExW
PostQuitMessage
DefWindowProcW
AppendMenuW
LoadStringW
LoadBitmapW
GetSysColor
FillRect
SetForegroundWindow
SetFocus
GetAsyncKeyState
GetCursorPos
GetSubMenu
GetWindowLongW
GetParent
DrawMenuBar
TrackPopupMenu
SetTimer
LoadImageW
DestroyMenu
KillTimer
GetSystemMetrics
MessageBoxW
PostMessageW
ShowWindow
UpdateWindow
FindWindowW
advapi32
RegSetValueExW
RegCreateKeyExW
RegEnumKeyExW
RegEnumValueW
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
RegDeleteKeyW
RegDeleteValueW
gdi32
CreateSolidBrush
GetObjectW
CreateCompatibleDC
SelectObject
BitBlt
SetTextColor
SetBkColor
TextOutW
CreateICW
GetTextExtentPoint32W
DeleteDC
DeleteObject
winspool.drv
ClosePrinter
GetPrinterDriverW
GetPrinterW
GetPrinterDataW
EnumPrinterDriversW
OpenPrinterW
OpenPrinterA
GetPrinterDriverA
EnumPrinterDriversA
comctl32
ord17
shell32
ShellExecuteW
Shell_NotifyIconW
Sections
.text Size: 160KB - Virtual size: 160KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 5KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 75KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE