Static task
static1
Behavioral task
behavioral1
Sample
52e2608c3214d5d6a1a28a89acdc8988.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
52e2608c3214d5d6a1a28a89acdc8988.exe
Resource
win10v2004-20231023-en
General
-
Target
52e2608c3214d5d6a1a28a89acdc8988.exe
-
Size
244KB
-
MD5
52e2608c3214d5d6a1a28a89acdc8988
-
SHA1
14b57a797bc5d01e9ded66318a53c3f2caa002dc
-
SHA256
e347ffe6bbec0b20c7439ba666cb0e888bb3b298b8eb64cc98af2ccbc5f6e190
-
SHA512
194e437822d1e498fbcf069a7a4881a9f86539b6d00d31ccbc9d28b2665cb271054ca2aedce92da20e88e55fc8332a82380730faf00d55ae6f7ac869c7842a92
-
SSDEEP
6144:IEXlSylvFuWaS54hIAv/QhuA7HY8pPZ0FP6BzxM5EmX:FAylvv5YRwh9HYd61xhmX
Malware Config
Signatures
Files
-
52e2608c3214d5d6a1a28a89acdc8988.exe.exe windows:4 windows x86 arch:x86
25724a12bec6f765c371201f99ac92be
Code Sign
a0:21:84:d7:75:ec:3c:ea:aa:63:97:b4:86:40:49:d6:b8:9e:37:c4Signer
Actual PE Digesta0:21:84:d7:75:ec:3c:ea:aa:63:97:b4:86:40:49:d6:b8:9e:37:c4Digest Algorithmsha1PE Digest MatchesfalseHeaders
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetNumberFormatA
SetEvent
FindResourceA
GetExpandedNameW
GetFileTime
RaiseException
GetTempPathW
FileTimeToDosDateTime
GetStringTypeA
SearchPathW
GetTempPathA
GetFileAttributesW
SetCalendarInfoA
GetVersion
CreateMailslotW
lstrlenA
EnumTimeFormatsW
VirtualAlloc
EnumCalendarInfoA
GetEnvironmentStringsW
SetLastError
GetCurrentProcess
ConnectNamedPipe
GetModuleFileNameW
lstrcpynA
GetCurrentThread
WaitForSingleObject
GlobalGetAtomNameA
OpenFile
GetTempFileNameW
ReplaceFileA
OpenMutexW
CreateDirectoryA
AddAtomW
GetCurrentProcessId
GetStringTypeW
OpenMutexA
GetLongPathNameA
CreateFiber
GetCurrentDirectoryW
CreateEventA
SystemTimeToFileTime
GlobalDeleteAtom
InitializeCriticalSection
SuspendThread
GetDiskFreeSpaceW
GetCurrentThreadId
CreateThread
SetComputerNameW
IsBadStringPtrA
user32
InsertMenuItemW
ChildWindowFromPoint
GetMessageA
GetWindowRgn
DrawTextW
GetDC
IsDlgButtonChecked
GetClassInfoA
LoadCursorA
CreateDialogParamW
CheckRadioButton
SetCursorPos
LoadImageA
SetWindowLongA
LoadMenuIndirectA
SetCapture
CreateMenu
EnableMenuItem
CharNextW
CheckDlgButton
OpenWindowStationA
gdi32
GetColorSpace
DeleteColorSpace
GetKerningPairsA
CreateMetaFileA
ColorCorrectPalette
GetCharWidthI
GetTextExtentExPointW
GetDCOrgEx
EnumFontFamiliesExW
GetClipRgn
GetCharWidth32W
CombineRgn
GetEnhMetaFileDescriptionA
SelectObject
UpdateICMRegKeyA
GetClipBox
CreateDIBPatternBrushPt
GetTextMetricsW
advapi32
IsValidAcl
RegDeleteValueW
RegRestoreKeyA
RegOpenKeyW
ole32
CoGetPSClsid
CoDeactivateObject
OleCreateEx
CLSIDFromProgID
CoGetCallerTID
OleUninitialize
CreateFileMoniker
Sections
.<9;kn% Size: 10KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.E Size: 1KB - Virtual size: 30KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.0<+' Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.< Size: 1024B - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.FpFJb Size: 3KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.(c1$7 Size: 1024B - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 212KB - Virtual size: 211KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ