Static task
static1
Behavioral task
behavioral1
Sample
544d5a0d47fa7453075a32107c31c1fa.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
544d5a0d47fa7453075a32107c31c1fa.exe
Resource
win10v2004-20231215-en
General
-
Target
544d5a0d47fa7453075a32107c31c1fa
-
Size
165KB
-
MD5
544d5a0d47fa7453075a32107c31c1fa
-
SHA1
2836f6b8e7d3008ec461c545da4bce2a06c67441
-
SHA256
c61e776ffc689643e8a3af9a6fd5438ca43500a6cbb0bcef6b4814e1835e335b
-
SHA512
330e61a0b85fcf0e093603929e473cd5515f91d80296a0934196e7f019b98cd830bb3292515392ca50d9ed70152bd8fb40e23e20de60814a871e41a05d496bcb
-
SSDEEP
3072:LDF2gmx1T0blVbKrMCOqOhYmvZRgFZRg+E7m/Mv29daj0nf:V2gk14DbTCOqOqmgX9daj0nf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 544d5a0d47fa7453075a32107c31c1fa
Files
-
544d5a0d47fa7453075a32107c31c1fa.exe windows:5 windows x86 arch:x86
bee7b1a9ad2b7e96195d45554841554e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
mfc90u
ord4603
ord4658
ord1493
ord3768
ord611
ord4652
ord1665
ord3622
ord909
ord3489
ord3286
ord2274
ord4044
ord333
ord6187
ord5867
ord280
ord4324
ord6094
ord6095
ord4131
ord2592
ord3185
ord4527
ord3741
ord2069
ord6065
ord4410
ord4541
ord2597
ord6109
ord3953
ord797
ord1262
ord6636
ord4345
ord6604
ord813
ord1751
ord1754
ord6411
ord3355
ord3145
ord2280
ord693
ord2595
ord6347
ord639
ord436
ord374
ord3515
ord4682
ord4664
ord1492
ord6408
ord3353
ord1675
ord1809
ord1810
ord2208
ord5324
ord5167
ord4631
ord5632
ord686
ord5653
ord2901
ord794
ord4448
ord4423
ord6801
ord4173
ord6803
ord4747
ord2251
ord2206
ord6035
ord4179
ord1048
ord5548
ord6741
ord5664
ord3743
ord5154
ord4702
ord6800
ord6466
ord5685
ord5683
ord960
ord965
ord969
ord967
ord971
ord2615
ord2635
ord2619
ord2625
ord2623
ord2621
ord2638
ord2633
ord2617
ord2640
ord2628
ord2610
ord2612
ord2630
ord2375
ord2368
ord1641
ord6802
ord4174
ord6804
ord3682
ord5404
ord6376
ord5830
ord4213
ord2087
ord3217
ord5674
ord5676
ord2447
ord4347
ord4996
ord5680
ord5663
ord6018
ord3115
ord4905
ord3670
ord589
ord4043
ord5008
ord6635
ord1688
ord6579
ord2904
ord6353
ord4000
ord3226
ord1442
ord5625
ord2139
ord1792
ord1791
ord1727
ord5650
ord2771
ord2983
ord3112
ord4728
ord2966
ord3140
ord2774
ord2893
ord2764
ord3252
ord4080
ord4081
ord4071
ord2891
ord4348
ord4910
ord4681
ord3563
ord595
ord1354
ord3488
ord2106
ord4741
ord1183
ord5602
ord2074
ord1728
ord5512
ord1272
ord3674
ord3537
ord744
ord636
ord2097
ord6547
ord367
ord524
ord2593
ord1353
ord3486
ord3621
ord6098
ord6091
ord4543
ord265
ord613
ord337
ord6096
ord3543
ord3166
ord1149
ord1137
ord1063
ord1248
ord1088
ord799
ord266
ord296
ord286
ord938
ord2537
ord2695
ord600
ord935
ord801
msvcr90
wcslen
_wcsicmp
wcschr
wcscpy_s
wcsncat_s
wcsncpy_s
wcsstr
swscanf_s
wcscmp
wcscat_s
swprintf_s
rand
srand
_time64
_wfopen_s
vswprintf_s
iswspace
iswalnum
wcscpy
wcsncmp
_wsplitpath_s
_snwprintf
memcpy
_read
_lseek
_filelength
_close
wcsncat
wcscat
printf
_wassert
realloc
calloc
strtoul
fclose
fgetws
_wfopen
_waccess
ftell
fseek
_wtoi
malloc
memset
__CxxFrameHandler3
wcsncpy
_wcsupr
_swprintf
wcsrchr
free
_amsg_exit
__wgetmainargs
_cexit
_exit
_XcptFilter
exit
_wcmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
_encode_pointer
__set_app_type
?terminate@@YAXXZ
_except_handler4_common
_unlock
__dllonexit
_lock
_onexit
_decode_pointer
_invoke_watson
_controlfp_s
?_type_info_dtor_internal_method@type_info@@QAEXXZ
_crt_debugger_hook
_errno
_wsopen
kernel32
EnterCriticalSection
LeaveCriticalSection
GetCurrentThread
LocalAlloc
LocalFree
GetVersionExW
WriteFile
GetFileAttributesW
SetFileAttributesW
CreateProcessW
GetExitCodeProcess
CreateEventW
WaitForSingleObject
DeleteFileW
CreateFileW
CloseHandle
GetPrivateProfileStringW
WritePrivateProfileStringW
LoadLibraryExW
InitializeCriticalSection
ExpandEnvironmentStringsA
LoadLibraryA
MulDiv
SetErrorMode
IsDebuggerPresent
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
SetUnhandledExceptionFilter
GetStartupInfoW
InterlockedCompareExchange
InterlockedExchange
FreeLibrary
GetModuleFileNameW
GetDateFormatW
lstrlenW
GetLastError
SetLastError
GetProcAddress
GetModuleHandleW
LoadLibraryW
CreateThread
Sleep
lstrcpyW
lstrcatW
lstrcmpiW
InterlockedIncrement
InterlockedDecrement
user32
GetSystemMetrics
DestroyIcon
InvalidateRect
FillRect
DrawIconEx
LoadIconW
CopyRect
InflateRect
DrawStateW
GetWindowRect
ScreenToClient
GetDC
ReleaseDC
GetParent
GetFocus
GetLastActivePopup
GetActiveWindow
UpdateWindow
GetIconInfo
GetClientRect
DispatchMessageW
TranslateMessage
PeekMessageW
SendMessageW
EnableWindow
LoadImageW
MessageBoxW
GetForegroundWindow
IsWindow
LoadStringW
gdi32
DeleteObject
CreatePatternBrush
CreateCompatibleDC
SelectObject
GetObjectW
GetDeviceCaps
RealizePalette
BitBlt
GetDIBColorTable
CreatePalette
SetPixel
GetPixel
GetTextExtentPoint32W
RoundRect
CreatePen
CreateHalftonePalette
CreateFontIndirectW
GetStockObject
CreateSolidBrush
advapi32
SetSecurityDescriptorDacl
IsValidSecurityDescriptor
RegDeleteKeyW
RegCloseKey
RegSetValueExW
RegCreateKeyExW
RegQueryValueExW
RegOpenKeyExW
OpenProcessToken
FreeSid
RevertToSelf
AccessCheck
RegOpenKeyExA
RegQueryValueExA
ImpersonateSelf
OpenThreadToken
AllocateAndInitializeSid
InitializeSecurityDescriptor
GetLengthSid
InitializeAcl
AddAccessAllowedAce
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
shell32
SHChangeNotify
ShellExecuteW
comctl32
ord17
_TrackMouseEvent
Sections
.text Size: 59KB - Virtual size: 59KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 81KB - Virtual size: 84KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE