?trash@@YGXXZ
Static task
static1
Behavioral task
behavioral1
Sample
52e06c3eff8a6922e78077d182bbaf25.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
52e06c3eff8a6922e78077d182bbaf25.exe
Resource
win10v2004-20231222-en
General
-
Target
52e06c3eff8a6922e78077d182bbaf25
-
Size
347KB
-
MD5
52e06c3eff8a6922e78077d182bbaf25
-
SHA1
55fdb4954faf671ca558e3adaa7f98176323db94
-
SHA256
4f16e7551755016e4494b68dfd6f32a8d8e48ef2c9348690bc65ca26e87fc3ee
-
SHA512
857ac8aa3376de84734c318622cd2559dd9d8553d2169e6766d8a725c0c922542736c4f51866ce032a907d353f258aac7110710d96521a1dcc5f37161d45703a
-
SSDEEP
6144:i6FMvJ61kirPXuLHDi1gYfihzS31GLouxV4qNaDzuYhAffFzu3:1CvM1nrPXuzGH6hzkwLoU0uYqQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 52e06c3eff8a6922e78077d182bbaf25
Files
-
52e06c3eff8a6922e78077d182bbaf25.exe windows:5 windows x86 arch:x86
d6910d180a6afca89d1b8aca2e6b5050
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
malloc
free
_except_handler3
realloc
atl
ord30
ord16
ord21
ord23
ord15
ord32
ord58
ord26
ord27
ord45
ord44
ord43
ord31
kernel32
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
TlsFree
TlsAlloc
DisableThreadLibraryCalls
FreeLibrary
GetModuleFileNameA
GetProcAddress
LoadLibraryW
GetModuleFileNameW
LeaveCriticalSection
InitializeCriticalSection
FlushInstructionCache
GetCurrentProcess
SetLastError
TlsSetValue
TlsGetValue
GetCurrentThreadId
lstrcatW
lstrcpyW
InterlockedCompareExchange
LoadLibraryA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
HeapFree
GetProcessHeap
HeapAlloc
VirtualFree
VirtualAlloc
GetLastError
LocalFree
LocalAlloc
ExpandEnvironmentStringsW
CreateProcessW
CloseHandle
DelayLoadFailureHook
lstrlenW
lstrcpynW
GetWindowsDirectoryW
EnterCriticalSection
GetModuleHandleW
user32
GetClassInfoExW
LoadAcceleratorsW
GetKeyState
DestroyAcceleratorTable
IsWindow
IntersectRect
EqualRect
OffsetRect
SetWindowRgn
RegisterClassExW
GetWindowLongW
SetWindowLongW
UnionRect
PtInRect
DestroyWindow
CreateWindowExW
DefWindowProcW
WaitForInputIdle
MapWindowPoints
SetWindowsHookExW
GetWindowRect
PostMessageW
SendMessageW
CallNextHookEx
UnhookWindowsHookEx
FindWindowW
BeginPaint
GetClientRect
EndPaint
GetParent
ShowWindow
GetFocus
IsChild
SetFocus
LoadStringW
CallWindowProcW
SetWindowPos
InvalidateRect
advapi32
RegCloseKey
RegDeleteKeyW
credui
CredUIReadSSOCredW
gdi32
RestoreDC
SetViewportOrgEx
SetWindowOrgEx
SetMapMode
SaveDC
LPtoDP
GetDeviceCaps
CreateRectRgnIndirect
DeleteDC
ole32
OleRegGetUserType
CreateOleAdviseHolder
CoTaskMemFree
CoCreateInstance
OleRegEnumVerbs
IsAccelerator
oleaut32
OleCreatePropertyFrame
SysAllocStringLen
SysAllocString
SysStringLen
RegisterTypeLi
LoadTypeLi
VariantChangeType
SysStringByteLen
SysFreeString
VariantClear
LoadRegTypeLi
shlwapi
SHDeleteKeyW
SHGetValueW
ord437
ord193
StrCatBuffW
ord24
Exports
Exports
Sections
.text Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 326KB - Virtual size: 328KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 460KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ