Static task
static1
Behavioral task
behavioral1
Sample
52a5ab31bc3005eac13fd8935d6e68f3f17dc917239830547d16623b51a479fb.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
52a5ab31bc3005eac13fd8935d6e68f3f17dc917239830547d16623b51a479fb.exe
Resource
win10v2004-20220812-en
General
-
Target
52a5ab31bc3005eac13fd8935d6e68f3f17dc917239830547d16623b51a479fb
-
Size
768KB
-
MD5
a1600ef6159ba6c5cf982213289eb26f
-
SHA1
9358c90f04025216c6e6de08075e902678900045
-
SHA256
52a5ab31bc3005eac13fd8935d6e68f3f17dc917239830547d16623b51a479fb
-
SHA512
b6d0d9b11c435fbf8226b4bd62bb92327202f846c7e8c77cd3161cf7cefc23c0669721e3786d6f06c45b2cc3ee8d66492fa2d74042a32d8af34c14e05b7f2740
-
SSDEEP
12288:QNz88bgGGtx8qc2D+y80JGkmR+Jm1Es8iDc+F1HAvnheS/FWF/G14jpt0xZS5ZN1:8z88bgGMx8qcO+y80JGTom2s8iQ+FVua
Malware Config
Signatures
Files
-
52a5ab31bc3005eac13fd8935d6e68f3f17dc917239830547d16623b51a479fb.exe windows x64
1247bf14b3b9a2616ea81e2949f5290b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
SetLastError
WriteFile
GetFileSizeEx
CreateFileA
GetSystemDirectoryA
LoadLibraryA
GetProcAddress
FreeLibrary
GetModuleHandleA
OpenProcess
SetFilePointerEx
ReadFile
GetCurrentProcess
Sleep
HeapReAlloc
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
HeapSize
SetStdHandle
InitializeCriticalSectionAndSpinCount
GetConsoleMode
GetConsoleCP
LCMapStringW
GetTickCount
GetCurrentThread
WaitForSingleObject
GetCurrentProcessId
GetModuleFileNameA
WideCharToMultiByte
CloseHandle
MultiByteToWideChar
DeviceIoControl
GetLastError
LocalFree
GetNativeSystemInfo
VirtualQuery
FreeResource
LockResource
LoadResource
SizeofResource
FindResourceA
FlushFileBuffers
SetEndOfFile
SetFileAttributesA
GetModuleHandleW
GetExitCodeProcess
CreateProcessA
Process32Next
Process32First
CreateToolhelp32Snapshot
GetFileAttributesA
DeleteFileA
GetTempFileNameA
GlobalFree
FindClose
FindNextFileA
FindFirstFileA
GlobalAlloc
GetWindowsDirectoryA
GetPrivateProfileStringA
GetCurrentThreadId
VirtualFree
VirtualAlloc
OpenMutexA
GetTempPathA
CreateDirectoryA
LocalAlloc
TerminateProcess
SystemTimeToFileTime
LocalFileTimeToFileTime
CreateMutexA
GetVersionExA
CopyFileA
MoveFileExA
MoveFileA
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetComputerNameA
HeapFree
HeapAlloc
GetCommandLineA
GetStartupInfoA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
RtlUnwindEx
HeapSetInformation
HeapCreate
ExitProcess
GetStdHandle
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetFileType
DeleteCriticalSection
SetFilePointer
EncodePointer
DecodePointer
FlsGetValue
FlsSetValue
FlsFree
FlsAlloc
RaiseException
RtlPcToFileHeader
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
LCMapStringA
ws2_32
recv
select
connect
shutdown
send
inet_addr
WSAGetLastError
socket
htons
setsockopt
sendto
recvfrom
closesocket
WSACleanup
gethostbyaddr
WSAStartup
gethostbyname
psapi
GetModuleBaseNameA
shlwapi
PathFileExistsA
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
userenv
CreateEnvironmentBlock
DestroyEnvironmentBlock
crypt32
CertCloseStore
CertFreeCertificateContext
CertGetNameStringA
CertFindCertificateInStore
CryptMsgGetParam
CryptQueryObject
CryptMsgClose
iphlpapi
GetAdaptersInfo
SendARP
user32
FindWindowExA
advapi32
RegDeleteKeyA
OpenProcessToken
DuplicateTokenEx
CreateProcessAsUserA
shell32
SHGetSpecialFolderPathA
Sections
.text Size: 142KB - Virtual size: 142KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 582KB - Virtual size: 595KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 616B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ