Static task
static1
Behavioral task
behavioral1
Sample
1554cace7093f2fc682a2dfb5415fe1e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1554cace7093f2fc682a2dfb5415fe1e.exe
Resource
win10v2004-20231215-en
General
-
Target
1554cace7093f2fc682a2dfb5415fe1e
-
Size
822KB
-
MD5
1554cace7093f2fc682a2dfb5415fe1e
-
SHA1
11d74b5fdbf598c20d491703508367923d0c0b28
-
SHA256
5aba2b13d518d8ad490a09ae22bb34792c25a21672d3ffc7bf61439b55952264
-
SHA512
34bfe48b3e28a6fa73fccf8b6d15cb4c2cad8632ad74d20169c35da151d047f467d3db9f2d6e0472efe1967471084606230ac2656fac45a44b7b9bc0ab6dfc62
-
SSDEEP
12288:F7wn+D/veWwYFSQrg4Q2I0iR3QkAWpX2Zj0pEA6GgGE+V+AZex/nD4:F7wn0veWwdifu3FAWoKpQfi+A6E
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1554cace7093f2fc682a2dfb5415fe1e
Files
-
1554cace7093f2fc682a2dfb5415fe1e.exe windows:4 windows x86 arch:x86
a034078957519e76badd5e2f3ad76e73
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetExitCodeProcess
WriteFile
GetEnvironmentVariableA
FindVolumeClose
lstrlenA
LocalFree
CreateEventA
GlobalSize
GetDriveTypeW
CloseHandle
VirtualAlloc
GlobalFree
InterlockedExchange
CreateMutexA
ResetEvent
GetModuleHandleW
GetCommandLineA
GetPrivateProfileIntW
GetACP
ResumeThread
user32
GetClassInfoA
GetCursorInfo
GetSysColor
SetFocus
DrawStateW
CallWindowProcW
CreateWindowExA
GetClientRect
GetKeyboardType
GetSysColor
DispatchMessageA
IsWindow
EndDialog
avicap32
videoThunk32
videoThunk32
videoThunk32
videoThunk32
AppCleanup
sysdm.cpl
NoExecuteAddFileOptOutList
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 812KB - Virtual size: 812KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ