Static task
static1
Behavioral task
behavioral1
Sample
52ca56e1e93e21a61b8fbe34a7bb0cb0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
52ca56e1e93e21a61b8fbe34a7bb0cb0.exe
Resource
win10v2004-20231222-en
General
-
Target
52ca56e1e93e21a61b8fbe34a7bb0cb0
-
Size
118KB
-
MD5
52ca56e1e93e21a61b8fbe34a7bb0cb0
-
SHA1
80ea6dfd7422cb60a255e334cb60d279e340cf93
-
SHA256
e4d2657afc794048f227d644b56e1791e93247c2879c70aea1037be713f4c73a
-
SHA512
6c5dd1beab29ed1df8bc646066eb46db97b382b4513bac680431a53b811b13af4dfdf441bd26e3dd8eb5f65cc33b77f0dcb5fa9f6795d8058cac7e9d064fd34c
-
SSDEEP
3072:8ZHIO4dT//4d9xgvlSwchHR7m7Dw1UegYVqUCS9rGIQLs:6IO4RETgvlYoDw1UuqUCS9rGIQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 52ca56e1e93e21a61b8fbe34a7bb0cb0
Files
-
52ca56e1e93e21a61b8fbe34a7bb0cb0.exe windows:4 windows x86 arch:x86
f2a12e0b515b02f131f8907976a98c70
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualFree
MultiByteToWideChar
IsBadReadPtr
WriteFile
GetLocalTime
SetFilePointer
CreateFileA
SetUnhandledExceptionFilter
GetModuleFileNameA
LoadLibraryA
GetTickCount
GetThreadLocale
GetVersion
ReadFile
GetStdHandle
SetThreadLocale
GetSystemDefaultLCID
IsDBCSLeadByte
WritePrivateProfileStringA
GetPrivateProfileStringA
GetPrivateProfileIntA
GetFullPathNameA
GetFileAttributesA
CreateMutexA
lstrlenA
SetProcessWorkingSetSize
GetCurrentProcess
FindClose
GetLastError
SetLastError
SetFileTime
SetEndOfFile
Sleep
ReleaseMutex
VirtualLock
ResumeThread
FormatMessageA
lstrcmpiA
GetCommandLineA
GetVolumeInformationA
GetDriveTypeA
GetDiskFreeSpaceA
SetCurrentDirectoryA
GetCurrentDirectoryA
DeleteFileA
RemoveDirectoryA
CreateDirectoryA
FindNextFileA
FindFirstFileA
SetFileAttributesA
GetModuleHandleA
lstrlenW
lstrcmpiW
GetCommandLineW
GetVolumeInformationW
GetDriveTypeW
GetDiskFreeSpaceW
GetFullPathNameW
SetCurrentDirectoryW
GetCurrentDirectoryW
DeleteFileW
RemoveDirectoryW
CreateDirectoryW
CreateFileW
FindNextFileW
FindFirstFileW
SetFileAttributesW
GetFileAttributesW
VirtualAlloc
SetEvent
GetStartupInfoA
LeaveCriticalSection
WaitForSingleObject
EnterCriticalSection
CloseHandle
DeleteCriticalSection
CreateEventA
InitializeCriticalSection
WideCharToMultiByte
GetProcAddress
SuspendThread
FreeLibrary
user32
wsprintfW
IsDialogMessageA
EndDialog
RegisterClassA
FindWindowA
LoadCursorA
CharLowerA
InsertMenuA
CharUpperA
DialogBoxParamA
CreateDialogParamA
GetWindowTextLengthA
CharLowerW
CharUpperW
InsertMenuW
DialogBoxParamW
CreateDialogParamW
MessageBoxW
SendDlgItemMessageW
SendMessageW
PostMessageW
LoadStringW
GetDlgItemTextW
GetWindowTextLengthW
SetWindowTextW
GetWindowTextW
CreateWindowExA
DestroyWindow
IsWindow
UpdateWindow
ShowWindow
DeferWindowPos
EndDeferWindowPos
PostQuitMessage
LoadAcceleratorsA
LoadIconA
SetClassLongA
RegisterWindowMessageA
GetSysColor
GetAsyncKeyState
IsWindowVisible
IsWindowEnabled
LoadStringA
GetMenuItemCount
DeleteMenu
CheckMenuItem
wvsprintfA
ClientToScreen
BeginDeferWindowPos
PtInRect
GetWindowPlacement
SetDlgItemTextW
DefWindowProcA
TranslateAcceleratorA
KillTimer
DispatchMessageA
GetMenu
GetMenuState
GetParent
SetFocus
ScreenToClient
GetClientRect
EnableWindow
GetSystemMetrics
wsprintfA
CallWindowProcA
PeekMessageA
MoveWindow
GetWindowWord
GetWindowLongA
SetWindowWord
SetWindowLongA
SetWindowTextA
GetWindowTextA
SetActiveWindow
GetForegroundWindow
GetWindowThreadProcessId
SystemParametersInfoA
AttachThreadInput
SetForegroundWindow
SetWindowPos
GetWindowRect
SendDlgItemMessageA
SendMessageA
PostMessageA
BringWindowToTop
MessageBoxA
IsDlgButtonChecked
CheckDlgButton
GetDlgItem
SetDlgItemInt
GetDlgItemInt
SetDlgItemTextA
GetDlgItemTextA
SetTimer
GetMessageA
TranslateMessage
GetSubMenu
comdlg32
GetSaveFileNameA
GetOpenFileNameA
GetSaveFileNameW
GetOpenFileNameW
advapi32
RegOpenKeyExA
RegCloseKey
RegEnumKeyExA
RegQueryValueExA
RegQueryValueA
RegCreateKeyExA
shell32
SHGetPathFromIDList
DragQueryFileW
DragQueryFileA
SHBrowseForFolder
Shell_NotifyIconA
DragQueryPoint
DragFinish
SHGetMalloc
ShellExecuteA
ole32
CoInitialize
CoUninitialize
CoCreateInstance
comctl32
ord17
msvcrt40
_initterm
__p__acmdln
exit
_XcptFilter
_exit
wcscmp
wcschr
_wcsnicmp
wcscpy
wcsrchr
swprintf
_mbschr
strcmp
strlen
strchr
strcpy
_purecall
_beginthreadex
memmove
calloc
wcslen
strstr
_ftol
strrchr
srand
rand
toupper
malloc
realloc
??2@YAPAXI@Z
free
sprintf
??3@YAXPAX@Z
__setusermatherr
_strnicmp
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
_strdup
_wcsdup
__getmainargs
Sections
.text Size: 70KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 23KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ