Static task
static1
Behavioral task
behavioral1
Sample
53d8f3498427e57da58c11fef9c0648bd45be9ce14c7f93ba515a33ec086af98.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
53d8f3498427e57da58c11fef9c0648bd45be9ce14c7f93ba515a33ec086af98.exe
Resource
win10v2004-20230915-en
General
-
Target
53d8f3498427e57da58c11fef9c0648bd45be9ce14c7f93ba515a33ec086af98
-
Size
1.7MB
-
MD5
681c143efa078a721660fc7d67be571e
-
SHA1
cab7b76b7ea8c0f2a1c3bb79f9ddec5f8f6a345b
-
SHA256
53d8f3498427e57da58c11fef9c0648bd45be9ce14c7f93ba515a33ec086af98
-
SHA512
17d77147583b7a282029cb51cffa71244cb40cb921a3102c87d50a635d5454c92202c9aa11452fba2ffdacfd510c4b37718ebdede42756fb3fd4912f4a1fe6e9
-
SSDEEP
49152:eJLfkIWAHs0bFFeP80KZ0rAUI6ISjOyucf2DT95HOR0:89HH5FdZwjOVS2D7uO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 53d8f3498427e57da58c11fef9c0648bd45be9ce14c7f93ba515a33ec086af98
Files
-
53d8f3498427e57da58c11fef9c0648bd45be9ce14c7f93ba515a33ec086af98.exe windows x86
96167196c9289e4c046066b27ae234f4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetEndOfFile
GetThreadLocale
GetCurrentProcess
FindClose
FindFirstFileA
CreateFileA
FileTimeToSystemTime
SetErrorMode
FileTimeToLocalFileTime
GetFileAttributesA
ExitThread
CreateThread
HeapFree
HeapAlloc
HeapReAlloc
GetCommandLineA
GetProcessHeap
GetStartupInfoA
RtlUnwind
RaiseException
ExitProcess
HeapSize
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
Sleep
HeapCreate
GetStdHandle
SetHandleCount
GetFileType
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
GetACP
GetTimeZoneInformation
GetConsoleCP
GetConsoleMode
SetStdHandle
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
IsValidCodePage
GetLocaleInfoW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
FlushFileBuffers
SetFilePointer
CreateFileW
FindNextFileA
IsBadReadPtr
CreateDirectoryA
GetSystemDirectoryA
GetComputerNameA
WriteFile
ReadFile
DeleteFileA
MoveFileA
WritePrivateProfileStringA
GetOEMCP
GetCPInfo
InterlockedIncrement
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GlobalFlags
InterlockedDecrement
GetModuleFileNameW
CreateEventA
SetEvent
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
lstrcmpA
GlobalAlloc
FormatMessageA
LocalFree
MulDiv
GetCurrentThreadId
GlobalGetAtomNameA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
SetLastError
lstrcmpW
GetVersionExA
SizeofResource
GlobalLock
GlobalUnlock
GlobalFree
FindResourceA
LoadResource
LockResource
FreeResource
OpenProcess
GetCurrentProcessId
GetLogicalDriveStringsA
QueryDosDeviceA
GetVersion
CompareStringA
GetLastError
InterlockedExchange
MultiByteToWideChar
CompareStringW
WideCharToMultiByte
lstrlenA
TerminateProcess
WaitForSingleObject
VirtualAlloc
GetModuleFileNameA
CreateProcessA
GetThreadContext
ReadProcessMemory
VirtualQueryEx
VirtualProtectEx
GetModuleHandleA
GetProcAddress
LoadLibraryA
FreeLibrary
WriteProcessMemory
SetThreadContext
ResumeThread
CloseHandle
VirtualFree
WriteProfileStringA
GetLocalTime
HeapDestroy
GetProfileStringA
user32
UnregisterClassA
DestroyMenu
LoadCursorA
GetSysColorBrush
EndPaint
BeginPaint
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
GetWindowThreadProcessId
SetCursor
GetMessageA
TranslateMessage
GetCursorPos
ValidateRect
PostQuitMessage
ReleaseDC
GetDC
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
GetMenuCheckMarkDimensions
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
RegisterWindowMessageA
LoadIconA
SendDlgItemMessageA
WinHelpA
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetFocus
SetFocus
GetWindowTextA
GetForegroundWindow
GetLastActivePopup
DispatchMessageA
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
GetKeyState
LoadStringA
MessageBoxA
SendMessageA
PostMessageA
EnableWindow
GetClientRect
SetForegroundWindow
IsWindowVisible
UpdateWindow
GetMenu
GetSubMenu
GetMenuItemID
GetMenuItemCount
CreateWindowExA
GetClassInfoExA
SetMenuItemBitmaps
LoadBitmapA
EndDialog
GetNextDlgTabItem
GetParent
IsWindowEnabled
GetDlgItem
GetWindowLongA
IsWindow
DestroyWindow
CreateDialogIndirectParamA
GetSystemMetrics
SetActiveWindow
GetActiveWindow
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
CopyRect
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetWindow
GetDesktopWindow
gdi32
ScaleWindowExtEx
DeleteDC
GetStockObject
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
DeleteObject
SetMapMode
RestoreDC
SaveDC
GetDeviceCaps
CreateBitmap
GetObjectA
SetBkColor
SetTextColor
GetClipBox
PtVisible
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
RegSetValueExA
RegCreateKeyExA
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
RegOpenKeyExA
RegQueryValueExA
RegOpenKeyA
RegCloseKey
shlwapi
PathFindFileNameA
PathFindExtensionA
ole32
CoCreateGuid
CLSIDFromString
oleaut32
SystemTimeToVariantTime
VariantClear
VariantChangeType
VariantInit
SysFreeString
VariantTimeToSystemTime
SysAllocString
psapi
GetProcessImageFileNameA
ws2_32
ioctlsocket
select
getsockopt
WSACreateEvent
WSAWaitForMultipleEvents
WSACloseEvent
WSASetLastError
WSAResetEvent
WSAEnumNetworkEvents
htonl
WSAStartup
WSACleanup
sendto
recvfrom
closesocket
bind
inet_addr
htons
socket
ntohl
ntohs
WSAGetLastError
connect
send
getpeername
setsockopt
WSAEventSelect
recv
Sections
.text Size: 316KB - Virtual size: 312KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 52KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ