Static task
static1
Behavioral task
behavioral1
Sample
52ed564bf24b8087ce2f05267709e7988789d58f09bee31442a83909ff9d2947.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
52ed564bf24b8087ce2f05267709e7988789d58f09bee31442a83909ff9d2947.exe
Resource
win10v2004-20231023-en
General
-
Target
52ed564bf24b8087ce2f05267709e7988789d58f09bee31442a83909ff9d2947.exe.zip
-
Size
22.4MB
-
MD5
c0f1a8ea87bc9f0d1e2b348e122d5125
-
SHA1
a08563db7c131c3ca13c3aafc42b63feaf8e785f
-
SHA256
4ed190576e00b4dff955e3c2136932c37459c4f49db113b9c63f3a4dd6075268
-
SHA512
76e29ea8837ae226730742469ad7a7cac8e50a167a536ca45e26cf5f66802e964a8a87d40781baa9dacb1846d07133cbe3bf35c3af046e5f977da8664a85ac3b
-
SSDEEP
393216:9v95i3uuJsc+COswvkssdRVGwjo7Gm8dE1iYKahNvcOCic5jqU2Qwzy8SEdOS1im:9G3LHOF7sFJjo7dUYKahNvcOCic5d4zR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/52ed564bf24b8087ce2f05267709e7988789d58f09bee31442a83909ff9d2947.exe
Files
-
52ed564bf24b8087ce2f05267709e7988789d58f09bee31442a83909ff9d2947.exe.zip.zip
Password: infected
-
52ed564bf24b8087ce2f05267709e7988789d58f09bee31442a83909ff9d2947.exe.exe windows:4 windows x86
8f252d622858e6b45e6c847617db8770
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetUnhandledExceptionFilter
lstrcmpiA
lstrcpyA
lstrlenA
_lclose
GetModuleFileNameA
_lread
_llseek
_lopen
_lwrite
_lcreat
CreateDirectoryA
SetCurrentDirectoryA
lstrcatA
FreeLibrary
GetProcAddress
LoadLibraryA
GetDiskFreeSpaceA
UnhandledExceptionFilter
RemoveDirectoryA
DeleteFileA
GetTempPathA
GetCurrentDirectoryA
CloseHandle
GetExitCodeProcess
LocalFree
Sleep
HeapSize
RtlUnwind
LCMapStringW
LCMapStringA
GetStringTypeW
GetCurrentProcess
GetFileAttributesA
TerminateProcess
MultiByteToWideChar
GetStringTypeA
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
GetLastError
InterlockedDecrement
ExitProcess
HeapFree
HeapAlloc
GetCommandLineA
GetVersionExA
GetProcessHeap
GetStartupInfoA
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetCPInfo
GetACP
GetOEMCP
WriteFile
GetStdHandle
InitializeCriticalSection
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetLocaleInfoA
user32
TranslateMessage
DispatchMessageA
PeekMessageA
wsprintfA
LoadCursorA
SetCursor
MessageBoxA
MsgWaitForMultipleObjects
advapi32
GetTokenInformation
OpenProcessToken
shell32
ShellExecuteExA
Sections
.text Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ