Static task
static1
Behavioral task
behavioral1
Sample
b54e64a6057aebaffb2329e0f8e5bc85.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
b54e64a6057aebaffb2329e0f8e5bc85.exe
Resource
win10v2004-20230915-en
General
-
Target
b54e64a6057aebaffb2329e0f8e5bc85
-
Size
298KB
-
MD5
b54e64a6057aebaffb2329e0f8e5bc85
-
SHA1
51a101d7b31a8718968280b50aca05b597fb2fa9
-
SHA256
a2260ac65c2814e6a0e7b839474a298333f2a4a7ac60af12861dcc9edf5a6019
-
SHA512
8eaefff1ea43928969efe0c1a441e88180dc692939d8c08bfe4d0767f789477bcb7f47da1a106bf225b74da416c89e4951eb4ee0a9349a2ebfd9c5981f0d578a
-
SSDEEP
3072:UEZQmHNFUoWFyRyZfmhrOsX5G3UjjvrmI8ITWau3joQuS9BTgtq7HG0AO8E:pzAoWFEGfm1DG3+VTzuluY1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b54e64a6057aebaffb2329e0f8e5bc85
Files
-
b54e64a6057aebaffb2329e0f8e5bc85.exe windows:5 windows x86
6d41cb748e4d1fea5be7cc98b4681858
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EnumCalendarInfoA
GetConsoleAliasesLengthW
GetNumaProcessorNode
GetDriveTypeW
BuildCommDCBAndTimeoutsA
SystemTimeToTzSpecificLocalTime
InterlockedIncrement
MoveFileExW
InterlockedDecrement
CreateJobObjectW
SetHandleInformation
GetProfileStringW
AddConsoleAliasW
SetVolumeMountPointW
FreeEnvironmentStringsA
GetModuleHandleW
GenerateConsoleCtrlEvent
GetConsoleAliasExesW
EnumTimeFormatsA
EnumTimeFormatsW
GetEnvironmentStrings
GetConsoleCP
LoadLibraryW
TerminateThread
FatalAppExitW
GetCalendarInfoW
GetStartupInfoW
CreateMailslotW
RaiseException
GetPrivateProfileIntW
InterlockedExchange
SetLocaleInfoA
SetThreadLocale
GetLastError
GetCurrentDirectoryW
BackupRead
MoveFileW
RemoveDirectoryA
EnumSystemCodePagesW
LoadLibraryA
OpenMutexA
GetProcessId
LocalAlloc
GetNumberFormatW
GlobalGetAtomNameW
EnumDateFormatsA
GlobalUnWire
GetModuleHandleA
EnumResourceNamesA
FindNextFileW
VirtualProtect
EnumDateFormatsW
PeekConsoleInputA
GetShortPathNameW
OpenSemaphoreW
FindFirstVolumeA
FindAtomW
FindFirstVolumeW
GetVolumeNameForVolumeMountPointW
DeleteFileW
CreateFileW
ReadFile
FlushFileBuffers
FindFirstFileW
GetCommandLineW
SetDefaultCommConfigA
GetFileSize
GetComputerNameA
GetStartupInfoA
WriteConsoleW
SetStdHandle
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
EncodePointer
DecodePointer
HeapFree
HeapAlloc
GetProcAddress
ExitProcess
DeleteFileA
HeapSetInformation
RtlUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
IsProcessorFeaturePresent
HeapCreate
WriteFile
GetStdHandle
GetModuleFileNameW
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
HeapSize
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetStringTypeW
MultiByteToWideChar
SetFilePointer
WideCharToMultiByte
GetConsoleMode
HeapReAlloc
LCMapStringW
CloseHandle
user32
GetComboBoxInfo
CharUpperW
gdi32
GetBoundsRect
GetTextFaceW
SelectPalette
advapi32
LookupAccountSidW
shell32
DragFinish
Sections
.text Size: 128KB - Virtual size: 128KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 90KB - Virtual size: 30.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 79KB - Virtual size: 78KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ