Static task
static1
Behavioral task
behavioral1
Sample
54ccde9ad9889baa86c278cafdafe5e5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
54ccde9ad9889baa86c278cafdafe5e5.exe
Resource
win10v2004-20231215-en
General
-
Target
54ccde9ad9889baa86c278cafdafe5e5
-
Size
295KB
-
MD5
54ccde9ad9889baa86c278cafdafe5e5
-
SHA1
b0ba1755015fe60d7eb729abdcd92aa96c360b17
-
SHA256
5db44e611194c7ea47b8c7d9e56a240dcf2632309c4a6f387ac6f152ba6a99ec
-
SHA512
70088d13ae3bd17da2ef88ad3649766d1b60c4101fd1655fbe9280ef38eda721702485b39e953008d4af9d65f3a195e9a8037aa7e19f18f0e3f29569d908d2c8
-
SSDEEP
6144:CJBCGqveUYPk93DwwrN6fggW93rAyeYXyQVNIU3s6EM6WxJ:C8x2UYPk9sqNHFsD1U3ZEM6WJ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 54ccde9ad9889baa86c278cafdafe5e5
Files
-
54ccde9ad9889baa86c278cafdafe5e5.exe windows:4 windows x86 arch:x86
d94c189f1da5e12668a501ff7f747ffb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDiskFreeSpaceA
GetCommandLineW
LocalUnlock
CreateFileA
FindVolumeClose
UnmapViewOfFile
GetTimeFormatW
GetTickCount
SetLastError
HeapCreate
lstrlenA
CreateThread
GetModuleHandleA
ResetEvent
LoadLibraryW
Sleep
CloseHandle
LocalFree
GetSystemTime
GetComputerNameA
user32
CreateWindowExA
CallWindowProcA
DispatchMessageA
FillRect
GetComboBoxInfo
DrawEdge
DrawMenuBar
IsWindow
SetFocus
DrawStateA
CheckRadioButton
GetDlgItem
GetDC
cryptui
LocalEnroll
WizardFree
CryptUIDlgSelectStoreA
CryptUIDlgCertMgr
CryptUIDlgSelectCA
hdwwiz.cpl
AddHardwareWizard
Sections
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 628KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 17KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ