Static task
static1
Behavioral task
behavioral1
Sample
52c4a7db6d896beb09dce435890f0a3e03b10b8796bc19593750272c3db1bbc9.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
52c4a7db6d896beb09dce435890f0a3e03b10b8796bc19593750272c3db1bbc9.exe
Resource
win10v2004-20221111-en
General
-
Target
52c4a7db6d896beb09dce435890f0a3e03b10b8796bc19593750272c3db1bbc9
-
Size
273KB
-
MD5
8b51cacb84b1873a065ccc1143c3ac28
-
SHA1
39548181b57181f418f75429424068f4305512d9
-
SHA256
52c4a7db6d896beb09dce435890f0a3e03b10b8796bc19593750272c3db1bbc9
-
SHA512
09ce26b8d03ed9d960bdf7cd52da763c57437ad5aafc07b5cbbd579eb7ec75bcf3726b6620ff6ce1574d17c1331559d18395f48a2f4d3544e6eda843fe29443b
-
SSDEEP
6144:7VCT28kIBRMpC/LNFf4njZSFvYl1ZRCBrpZ9a:7VeFBRD14VsOU
Malware Config
Signatures
Files
-
52c4a7db6d896beb09dce435890f0a3e03b10b8796bc19593750272c3db1bbc9.exe windows x86
ad3dee26cffc2b58bcca3cc2404a4db6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
ExtractIconW
gdi32
DeviceCapabilitiesExA
CreateEllipticRgn
GetObjectW
AbortDoc
PolyDraw
PolyTextOutA
CancelDC
GetNearestPaletteIndex
SetWorldTransform
GetCharABCWidthsW
SelectPalette
CreateDCA
EnumFontsW
SetTextAlign
GetDeviceCaps
CombineRgn
DeleteDC
EnableEUDC
Ellipse
kernel32
HeapDestroy
GetProcAddress
MultiByteToWideChar
SetEnvironmentVariableA
UnhandledExceptionFilter
GetFileType
SetFilePointer
GetOEMCP
FreeEnvironmentStringsA
VirtualQuery
CreateMutexA
GetTimeFormatA
GetModuleFileNameA
GetVersionExA
OpenMutexA
IsBadWritePtr
TlsFree
RtlUnwind
IsValidLocale
VirtualProtectEx
GetSystemInfo
GetTimeZoneInformation
WideCharToMultiByte
GetStringTypeA
GetEnvironmentStrings
InitializeCriticalSection
GetCurrentThread
GetCPInfo
GetStringTypeW
HeapAlloc
GetCommandLineA
GetSystemTimeAsFileTime
EnterCriticalSection
GetACP
IsValidCodePage
WriteFile
GlobalUnlock
GetStartupInfoW
LeaveCriticalSection
TlsAlloc
GetStdHandle
CompareStringW
HeapFree
VirtualProtect
GetLastError
ReadConsoleA
GetCurrentThreadId
HeapSize
InterlockedExchange
SetHandleCount
LCMapStringA
ReadFile
GetLocaleInfoA
GetCurrentProcess
QueryPerformanceCounter
GetStartupInfoA
VirtualFree
SetStdHandle
FindNextFileW
EnumSystemLocalesA
VirtualAlloc
GetUserDefaultLCID
CompareStringA
HeapReAlloc
GetCurrentProcessId
GetSystemTime
HeapCreate
TlsGetValue
GetModuleFileNameW
DeleteCriticalSection
FlushFileBuffers
GetDateFormatA
GetEnvironmentStringsW
GetTickCount
FreeEnvironmentStringsW
GetLocaleInfoW
SetLastError
GetModuleHandleA
ExitProcess
TlsSetValue
GetCommandLineW
LoadLibraryA
CloseHandle
TerminateProcess
LCMapStringW
wininet
InternetShowSecurityInfoByURL
InternetShowSecurityInfoByURLA
InternetAutodialHangup
GopherCreateLocatorA
IsHostInProxyBypassList
comctl32
ImageList_GetBkColor
ImageList_Remove
ImageList_Duplicate
DestroyPropertySheetPage
InitCommonControlsEx
_TrackMouseEvent
user32
AttachThreadInput
CopyAcceleratorTableW
GetDlgItemTextA
wsprintfW
SendMessageTimeoutW
TrackMouseEvent
OpenDesktopA
RegisterClassExA
CallWindowProcW
GetClassLongW
CreateWindowExA
MessageBoxIndirectW
AppendMenuA
GetKeyboardLayoutNameA
DestroyWindow
WINNLSEnableIME
InsertMenuA
TileChildWindows
CheckMenuRadioItem
MessageBoxW
DefWindowProcA
DdeAccessData
GetClipboardSequenceNumber
MapWindowPoints
RegisterClassA
GetShellWindow
SetCapture
InsertMenuItemA
AdjustWindowRectEx
GetCursorInfo
LoadMenuW
ShowWindow
GetKeyNameTextW
EnumDisplaySettingsA
IsRectEmpty
IsWindowVisible
WinHelpA
SendMessageW
Sections
.text Size: 75KB - Virtual size: 75KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 75KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 86KB - Virtual size: 103KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ