Static task
static1
Behavioral task
behavioral1
Sample
5b52221b6f9ca6cf8add39a14130e2364e179d77a4eec2a4e4e415376087c3bb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5b52221b6f9ca6cf8add39a14130e2364e179d77a4eec2a4e4e415376087c3bb.exe
Resource
win10v2004-20221111-en
General
-
Target
5b52221b6f9ca6cf8add39a14130e2364e179d77a4eec2a4e4e415376087c3bb
-
Size
344KB
-
MD5
3456cc4a40f132f24a7c958c34a95c50
-
SHA1
09b1f511556c528e7e93ffe52ab1ca5e39e74d97
-
SHA256
5b52221b6f9ca6cf8add39a14130e2364e179d77a4eec2a4e4e415376087c3bb
-
SHA512
55265c5932ce06360340f91e460d06da1218a603743d7d85522f05fd0ea6ee4e5418ae439df6cfc701a65835a59eb904d87f95a6b8c39e0720537e9d01fda152
-
SSDEEP
6144:scDWeh7E8jB80j9VdnCOBIlgBmEy/KxzP1xpw8txFlqQqumepoWbyd8gUKSXct6g:scDWeh7E8jB5j9VdnCOBIlgBmEy/KxzW
Malware Config
Signatures
Files
-
5b52221b6f9ca6cf8add39a14130e2364e179d77a4eec2a4e4e415376087c3bb.exe windows x86
d74b8a0973eec9a18e8fcbe5c73fd47e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReadFile
CreateFileA
VirtualFree
VirtualAlloc
HeapFree
HeapAlloc
GetProcessHeap
CloseHandle
SwitchToThread
CreateThread
OpenThread
GetCurrentThreadId
user32
DestroyWindow
CreateWindowExA
CloseClipboard
EmptyClipboard
OpenClipboard
FindWindowA
dhcpcsvc
DhcpRequestParams
Sections
.text Size: 77KB - Virtual size: 77KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 133KB - Virtual size: 140KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 21B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 82KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE