Static task
static1
Behavioral task
behavioral1
Sample
52231c48d6e9d38c6adb9efec6d23231.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
52231c48d6e9d38c6adb9efec6d23231.exe
Resource
win10v2004-20231215-en
General
-
Target
52231c48d6e9d38c6adb9efec6d23231
-
Size
24KB
-
MD5
52231c48d6e9d38c6adb9efec6d23231
-
SHA1
5787811faeaac713c303311ae591f18e87681b6e
-
SHA256
047c51af17ae54430b8676b8d4c66a855ccbf71bdcbdd4d32dfe862f38e1c7c3
-
SHA512
db0cebe03c0269c8ed7a3bd89306b5c2307cfae84af2812a3a57f14612647a84ddbf07150965f26e4a19d1da5ab14034990ed15f7e00c4c2d43faba40065bfcf
-
SSDEEP
192:7vEPTQ0NqFXk5hWur5kH3vAoXArMy8vDfjQTtkNP1oy8JYfkv3bKQ9Z1:7vEU/XyWEw3vAoXAgy8vgTe51ZU3b
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 52231c48d6e9d38c6adb9efec6d23231
Files
-
52231c48d6e9d38c6adb9efec6d23231.exe windows:4 windows x86 arch:x86
91488a23145f475fbb37ac8a2a73647e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetWindowsDirectoryA
GetLongPathNameA
GetTempPathA
MoveFileA
DeleteFileA
CloseHandle
WriteFile
CreateFileA
FreeLibrary
GetProcAddress
LoadLibraryA
Sleep
GetModuleFileNameA
CreateProcessA
GetModuleHandleA
GetStartupInfoA
msvcrt
isspace
ispunct
isprint
islower
isgraph
isdigit
isalpha
isalnum
div
ceil
isupper
strstr
??2@YAPAXI@Z
atol
_access
_except_handler3
sprintf
rand
srand
time
__CxxFrameHandler
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_controlfp
isxdigit
??3@YAXPAX@Z
_itoa
Sections
.text Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 928B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ