Static task
static1
Behavioral task
behavioral1
Sample
53d54db8bd394d372ff15b59ea19eefc.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
53d54db8bd394d372ff15b59ea19eefc.exe
Resource
win10v2004-20231215-en
General
-
Target
53d54db8bd394d372ff15b59ea19eefc
-
Size
232KB
-
MD5
53d54db8bd394d372ff15b59ea19eefc
-
SHA1
03cbbefe553383f1f24f73aa8e7dcd2207014f3c
-
SHA256
bdb8dbe40daf8bbff5c05b9eba230c2b01c499f2d7d9dac48119a3d9c186eb51
-
SHA512
1e7669c975d2b28e087d59a858230e7e587ddeb3211c0f05f661c0261b3a87326346493f631b819356811732b1ea7719d4dd4aa1ebcc709f22dd49b52a7d268e
-
SSDEEP
6144:fIn47fQCW9aDJsVPDyi0AvCfNbHeMS+2k:fS4ZKZdCZO+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 53d54db8bd394d372ff15b59ea19eefc
Files
-
53d54db8bd394d372ff15b59ea19eefc.exe windows:4 windows x86 arch:x86
7a9179f976acb178805e8b29981222e7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleW
GetVersion
GetStdHandle
GetVersionExA
GetLastError
lstrcpyA
GetModuleFileNameA
CreateEventA
LocalReAlloc
LocalAlloc
lstrlenA
GetCommandLineW
CloseHandle
GetModuleHandleA
FindResourceA
VirtualAllocEx
LoadLibraryA
lstrcmpA
GetCurrentThreadId
GlobalFindAtomA
lstrlenW
GlobalAlloc
FreeResource
GetStringTypeA
GetCommandLineA
ExitThread
GetFileSize
ExitProcess
Sleep
GetThreadLocale
GetProcAddress
IsBadReadPtr
user32
WindowFromPoint
ShowScrollBar
SetTimer
GetFocus
LoadKeyboardLayoutA
EnableMenuItem
GetWindowRect
SetParent
CreateIcon
GetParent
GetCapture
LoadStringA
SendMessageA
GetDesktopWindow
GetIconInfo
UpdateWindow
GetScrollPos
EqualRect
FillRect
DestroyIcon
TrackPopupMenu
GetMessagePos
SetWindowPos
DrawTextA
GetMenu
IntersectRect
DefFrameProcA
LoadCursorA
ClientToScreen
UnhookWindowsHookEx
OffsetRect
ScrollWindow
GetKeyboardLayoutList
SetWindowTextA
PtInRect
CharLowerBuffA
ActivateKeyboardLayout
GetDC
GetKeyboardLayout
EnableScrollBar
IsIconic
GetMenuItemID
GetCursor
GetClassInfoA
KillTimer
GetKeyboardState
OpenClipboard
OemToCharA
GetClientRect
GetMenuState
GetWindowLongW
WaitMessage
DrawAnimatedRects
SendMessageW
GetWindowLongA
DestroyCursor
LoadIconA
RegisterClipboardFormatA
GetPropA
TranslateMDISysAccel
CreateMenu
DestroyWindow
SetCapture
SetCursor
AdjustWindowRectEx
GetKeyboardType
SetClassLongA
GetDlgItem
RegisterWindowMessageA
CallWindowProcA
CharNextW
GetDCEx
GetWindowThreadProcessId
ChildWindowFromPoint
GetClassLongA
CreateWindowExA
SetWindowLongW
CharLowerA
ReleaseCapture
IsDialogMessageW
IsDialogMessageA
DrawFrameControl
GetClipboardData
DispatchMessageA
MessageBoxA
DrawIcon
ScreenToClient
CallNextHookEx
GetActiveWindow
UnregisterClassA
GetScrollInfo
GetSubMenu
FindWindowA
RegisterClassA
SetScrollInfo
GetKeyState
IsWindow
InsertMenuItemA
BeginPaint
SetActiveWindow
DefWindowProcA
EndPaint
InvalidateRect
SetMenuItemInfoA
GetSystemMenu
PostMessageA
SystemParametersInfoA
GetWindow
InsertMenuA
RedrawWindow
TranslateMessage
CharToOemA
DrawEdge
IsWindowUnicode
MapVirtualKeyA
MapWindowPoints
SetClipboardData
PeekMessageA
GetMenuItemCount
MsgWaitForMultipleObjects
SetScrollRange
PeekMessageW
EnumChildWindows
GetWindowDC
GetMenuStringA
MoveWindow
wsprintfA
EnumThreadWindows
GetForegroundWindow
MessageBeep
DestroyMenu
DispatchMessageW
InflateRect
CharNextA
SetFocus
GetKeyNameTextA
SetRect
SetForegroundWindow
CharUpperBuffA
FrameRect
SetWindowLongA
PostQuitMessage
GetWindowPlacement
EnumWindows
GetLastActivePopup
SetWindowsHookExA
SetPropA
DrawIconEx
SetWindowPlacement
SetScrollPos
IsZoomed
IsChild
DrawMenuBar
IsRectEmpty
CheckMenuItem
GetMenuItemInfoA
DeleteMenu
LoadBitmapA
GetWindowTextA
CreatePopupMenu
SetMenu
ShowWindow
IsWindowEnabled
GetSystemMetrics
CloseClipboard
ShowOwnedPopups
GetKeyboardLayoutNameA
GetClassNameA
GetScrollRange
GetSysColor
DefMDIChildProcA
IsWindowVisible
GetCursorPos
gdi32
GetPaletteEntries
GetPixel
GetDIBColorTable
GetRgnBox
ole32
CLSIDFromString
CoGetMalloc
MkParseDisplayName
CreateBindCtx
CoTaskMemFree
CoGetContextToken
CoCreateFreeThreadedMarshaler
shell32
SHGetFolderPathA
Sections
CODE Size: 74KB - Virtual size: 73KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 145KB - Virtual size: 144KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc1 Size: 1024B - Virtual size: 618B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc4 Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc0 Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc6 Size: 1024B - Virtual size: 682B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc3 Size: 1024B - Virtual size: 810B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 984B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ