Static task
static1
Behavioral task
behavioral1
Sample
52c340877770462720620f0c51746f09431a4eb4bc1b95ed9f9fe8818ef0ee86.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
52c340877770462720620f0c51746f09431a4eb4bc1b95ed9f9fe8818ef0ee86.exe
Resource
win10v2004-20220812-en
General
-
Target
52c340877770462720620f0c51746f09431a4eb4bc1b95ed9f9fe8818ef0ee86
-
Size
252KB
-
MD5
9e793418f7d2e097760b25780db37342
-
SHA1
e9db8df027cf3d442540ea4ae3f86f5f18b04f4c
-
SHA256
52c340877770462720620f0c51746f09431a4eb4bc1b95ed9f9fe8818ef0ee86
-
SHA512
a08e492e325dbe453de615c80699455e6598aebe23c5a5629d0962acfa69fca29f78959c6497d55103a29fd00300dbb5a19a67ee66b79c2a04bba74c378025b1
-
SSDEEP
6144:BOgKFZFGO3SrRmX2KTZRjWcxXrUtb0w4rHTE:By3FGO3SrRmmKTZRfxXr/d
Malware Config
Signatures
Files
-
52c340877770462720620f0c51746f09431a4eb4bc1b95ed9f9fe8818ef0ee86.exe windows x86
798c5ca7d3f17914379e59ad26fda4c0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcmpiA
WriteFile
CreateFileA
CreateDirectoryA
SetFileTime
LocalFileTimeToFileTime
DosDateTimeToFileTime
GetFileTime
GetCurrentDirectoryA
WideCharToMultiByte
GetPrivateProfileStringA
GetVersionExA
GetVersion
WaitForSingleObject
CreateProcessA
GetExitCodeProcess
GetProcAddress
GetModuleHandleA
Process32Next
GetCurrentProcessId
OpenProcess
Process32First
CreateToolhelp32Snapshot
SetLastError
CreateRemoteThread
DuplicateHandle
DeviceIoControl
GetFileSize
FindClose
FindFirstFileA
RemoveDirectoryA
FindNextFileA
SetFileAttributesA
GetTempFileNameA
FreeLibrary
LoadLibraryA
TerminateProcess
LoadLibraryExA
Sleep
lstrlenW
MultiByteToWideChar
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetStringTypeW
GetStringTypeA
IsBadCodePtr
GetFileAttributesA
FlushFileBuffers
SetUnhandledExceptionFilter
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
SetStdHandle
GetStdHandle
SetHandleCount
SetFilePointer
ReadFile
SetEndOfFile
LCMapStringW
LCMapStringA
IsBadWritePtr
VirtualAlloc
VirtualFree
HeapCreate
GetOEMCP
GetACP
GetCPInfo
HeapSize
HeapReAlloc
RaiseException
ExitProcess
GetCommandLineA
GetStartupInfoA
GetFileType
GetSystemTime
GetTimeZoneInformation
HeapAlloc
HeapFree
RtlUnwind
LocalFree
GlobalAlloc
GlobalLock
GlobalUnlock
lstrlenA
HeapDestroy
EnterCriticalSection
LeaveCriticalSection
CreateMutexA
GetLastError
InitializeCriticalSection
DeleteCriticalSection
CloseHandle
InterlockedDecrement
InterlockedIncrement
lstrcpyA
GetFullPathNameA
GetWindowsDirectoryA
GetSystemDirectoryA
GetTempPathA
GetModuleFileNameA
DeleteFileA
GetCurrentProcess
FlushInstructionCache
GetCurrentThreadId
IsBadReadPtr
lstrcmpA
GetLocalTime
user32
FindWindowExA
DispatchMessageA
TranslateMessage
GetMessageA
IsWindow
CreateWindowExA
RegisterClassA
LoadIconA
LoadCursorA
IsWindowVisible
RegisterWindowMessageA
SendMessageTimeoutA
wsprintfA
ShowWindow
FindWindowA
GetWindowThreadProcessId
GetWindowRect
SystemParametersInfoA
MapWindowPoints
PeekMessageA
GetDlgItem
SendMessageA
InvalidateRgn
InvalidateRect
PostMessageA
DefWindowProcA
SetTimer
PostQuitMessage
KillTimer
RegisterClassExA
GetClassInfoExA
GetWindowLongA
GetWindow
SetCapture
ReleaseCapture
SetWindowLongA
SetWindowTextA
DestroyWindow
CreateAcceleratorTableA
GetDesktopWindow
GetParent
GetClassNameA
RedrawWindow
SetWindowPos
GetClientRect
BeginPaint
FillRect
EndPaint
GetDC
ReleaseDC
IsChild
GetFocus
SetFocus
GetSysColor
CallWindowProcA
GetWindowTextLengthA
GetWindowTextA
EnumChildWindows
gdi32
GetStockObject
GetObjectA
DeleteObject
CreateCompatibleBitmap
CreateCompatibleDC
SelectObject
BitBlt
DeleteDC
GetDeviceCaps
CreateSolidBrush
advapi32
CreateServiceA
OpenServiceA
StartServiceA
ControlService
DeleteService
RegCloseKey
RegQueryValueExA
RegCreateKeyExA
RegOpenKeyExA
RegSetValueExA
RegDeleteValueA
RegDeleteKeyA
RegEnumKeyExA
ChangeServiceConfig2A
CloseServiceHandle
QueryServiceStatus
OpenSCManagerA
shell32
ShellExecuteExA
SHGetMalloc
SHGetPathFromIDListA
SHGetSpecialFolderLocation
SHGetSpecialFolderPathA
ole32
CLSIDFromString
CoCreateGuid
CoInitialize
CoTaskMemAlloc
StringFromCLSID
CoTaskMemFree
CoCreateInstance
OleLockRunning
CLSIDFromProgID
OleInitialize
CreateStreamOnHGlobal
OleUninitialize
CoUninitialize
oleaut32
SysAllocStringByteLen
SysStringByteLen
LoadRegTypeLi
SysAllocStringLen
VariantCopy
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayCreateVector
OleCreateFontIndirect
VariantInit
SysAllocString
VariantChangeType
VariantClear
SysStringLen
SysFreeString
urlmon
URLDownloadToFileA
wininet
InternetReadFile
InternetOpenA
InternetOpenUrlA
InternetCloseHandle
InternetQueryDataAvailable
DeleteUrlCacheEntry
oleacc
ObjectFromLresult
iphlpapi
GetAdaptersInfo
Sections
.text Size: 196KB - Virtual size: 195KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sxdata Size: 4KB - Virtual size: 124B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 936B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ