Static task
static1
Behavioral task
behavioral1
Sample
522b8b8728754f396e4742b483d53e5d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
522b8b8728754f396e4742b483d53e5d.exe
Resource
win10v2004-20231215-en
General
-
Target
522b8b8728754f396e4742b483d53e5d
-
Size
308KB
-
MD5
522b8b8728754f396e4742b483d53e5d
-
SHA1
7a1fd23cb969ea18aafb17b4bbdff3224006a43e
-
SHA256
b769b2be5351d33607879831f5165ecbbf9aaf5b90b8c55583df10d34774657f
-
SHA512
a6a8f24cbe18d6d6c57984acd35a3f517a13760d5413887f21cac5eaebf497b9a72f9532ad1e122b6ef1c0adb9d090cbf9254fe900fb47beea2700e2cb1be991
-
SSDEEP
6144:ZP9L0GjZuVEolNySb7tGhkDVTY1mvLPjAN8PAZ+W46NuCrG7Rts4GUDYVa+:ZPJ9ZumWNyaY0W1mv7m8PAnfNQVNqa+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 522b8b8728754f396e4742b483d53e5d
Files
-
522b8b8728754f396e4742b483d53e5d.exe windows:4 windows x86 arch:x86
7c8fd98a7001ad16bf5bb653f98d8b8a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReleaseMutex
VirtualFree
Sleep
GetCurrentThread
GetLastError
CloseHandle
HeapLock
WriteFile
VirtualAlloc
OpenSemaphoreA
OpenFile
HeapUnlock
GetModuleHandleA
GetCurrentProcessId
GetCurrentThreadId
HeapSize
DeleteFileA
ExitProcess
CreateEventA
LocalSize
GetSystemInfo
VirtualProtect
GetLocaleInfoA
RtlUnwind
GetStringTypeW
GetProcAddress
VirtualAllocEx
GetCurrentProcess
ResumeThread
GetStringTypeA
LCMapStringW
MultiByteToWideChar
LCMapStringA
VirtualQuery
GetStartupInfoA
GetCommandLineA
GetVersionExA
TerminateProcess
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
GetFileType
HeapDestroy
HeapCreate
HeapFree
LoadLibraryA
GetACP
GetOEMCP
GetCPInfo
HeapAlloc
HeapReAlloc
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
user32
IsChild
PostMessageA
LoadStringA
IsWindowVisible
gdi32
CreatePatternBrush
advapi32
OpenProcessToken
psapi
GetModuleBaseNameA
GetProcessMemoryInfo
msvfw32
DrawDibDraw
Sections
.text Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 285KB - Virtual size: 688KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ