Static task
static1
Behavioral task
behavioral1
Sample
52a543eaf017fa0d1492d060061747d878c41126e751422af37cd5d390837f37.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
52a543eaf017fa0d1492d060061747d878c41126e751422af37cd5d390837f37.exe
Resource
win10v2004-20221111-en
General
-
Target
52a543eaf017fa0d1492d060061747d878c41126e751422af37cd5d390837f37
-
Size
5.9MB
-
MD5
3fd159afc5b6c2352c834d0ad09011d0
-
SHA1
07113355164c16ee09e84a1240d29599255dcb3f
-
SHA256
52a543eaf017fa0d1492d060061747d878c41126e751422af37cd5d390837f37
-
SHA512
00554acdc04ff16a9ebf8eebd17e0357ff0a921f682ea5a483794f8bc2bcff8b17f6947381bfa154fd0bd298d12d568adc6f66a8098df6a7c01ccead87edf41e
-
SSDEEP
98304:XvWwvHp9TpZWGM/DLvBMC0cmKnAIXp6gt2u0McKgHIN8LTk+dyu0V66G:fWwfzM/HZMUF3XAA2uLlNSZ8O6
Malware Config
Signatures
Files
-
52a543eaf017fa0d1492d060061747d878c41126e751422af37cd5d390837f37.exe windows x86
e15be3301d9de329c336428ffda4ebff
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcessHeap
HeapAlloc
LoadLibraryA
CreateMutexA
CloseHandle
GetCurrentProcess
GetLastError
GetTickCount
GetProcAddress
InterlockedCompareExchange
SetLastError
LocalFileTimeToFileTime
GetVersionExA
GetModuleHandleExW
GetLocalTime
Sleep
HeapReAlloc
ExitThread
EnterCriticalSection
GetCurrentThread
IsBadWritePtr
VirtualProtect
HeapFree
CreateFileW
FileTimeToLocalFileTime
WaitForSingleObject
IsBadReadPtr
VirtualFree
GetModuleHandleA
VirtualAlloc
WriteConsoleW
SetStdHandle
SetFilePointerEx
GetConsoleMode
GetConsoleCP
LCMapStringW
LoadLibraryW
OutputDebugStringW
LoadLibraryExW
LeaveCriticalSection
GetModuleHandleW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
FlushFileBuffers
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
FreeEnvironmentStringsW
IsProcessorFeaturePresent
RtlUnwind
GetCommandLineA
InterlockedDecrement
ExitProcess
MultiByteToWideChar
GetStdHandle
WriteFile
GetModuleFileNameW
HeapSize
RaiseException
IsDebuggerPresent
InterlockedIncrement
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
GetStringTypeW
GetCurrentThreadId
WideCharToMultiByte
GetFileType
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetStartupInfoW
GetModuleFileNameA
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
advapi32
RegQueryValueExW
RegCreateKeyExA
RegOpenKeyA
RegEnumKeyW
RegOpenKeyExW
user32
BringWindowToTop
GetSystemMetrics
RegisterWindowMessageA
SendMessageA
GetWindowTextW
RegisterClassExW
CloseDesktop
SendMessageW
RegisterWindowMessageW
DestroyWindow
RedrawWindow
GetLastInputInfo
UpdateWindow
LoadIconA
GetWindowTextA
GetDesktopWindow
PostQuitMessage
MsgWaitForMultipleObjects
SetForegroundWindow
DefWindowProcW
GetClientRect
PostMessageW
SetWindowPos
PeekMessageW
LoadIconW
RegisterClassExA
CheckMenuItem
TrackPopupMenu
GetDlgItem
Sections
.text Size: 449KB - Virtual size: 449KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 370KB - Virtual size: 370KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5.0MB - Virtual size: 5.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 29KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ