Static task
static1
Behavioral task
behavioral1
Sample
54f499d54a0ae1580cf2e8ca331fb28a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
54f499d54a0ae1580cf2e8ca331fb28a.exe
Resource
win10v2004-20231215-en
General
-
Target
54f499d54a0ae1580cf2e8ca331fb28a
-
Size
352KB
-
MD5
54f499d54a0ae1580cf2e8ca331fb28a
-
SHA1
bd9a69a9ba7d30b6807970a89a0248a59b1cb5a7
-
SHA256
9e905c782b263b30f0f9928f590fd4ec4ec15262730ac43dba3508c8e2b798e2
-
SHA512
e45663f1ba5bceaaf7a7efd0bc59aad394f7658096bef3e091bff7cf390a567b19be15886a6fd48c3ac0e01f38bba3f776061579d898eef1daf4e3b3a4012652
-
SSDEEP
6144:MpmVg2t5Acd07AfV9xZF3pRaUyLN7XT7iUOo1TCmv1V4UvZZCKkDOLuPbNNi04X:UWTwc/PRaUyLNTOU7TZ5HkDOSBwv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 54f499d54a0ae1580cf2e8ca331fb28a
Files
-
54f499d54a0ae1580cf2e8ca331fb28a.exe windows:4 windows x86 arch:x86
d3733f5f08ffc8c19b6928429f4cf139
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetSystemTime
CloseHandle
GetModuleHandleA
lstrlenA
CancelIo
FreeConsole
GetStdHandle
GlobalUnlock
FindClose
IsBadReadPtr
LocalFree
LoadLibraryExW
CreateEventA
VirtualProtectEx
GetConsoleTitleA
GlobalLock
GetLastError
EnumResourceTypesW
CreateMutexA
IsDebuggerPresent
user32
DialogBoxParamA
GetMessageA
IsMenu
GetMessageA
CreateWindowExA
GetDlgItemTextA
GetParent
GetSubMenu
GetKeyState
IsIconic
EndDialog
LoadCursorA
EnumWindows
MessageBoxA
clbcatq
GetComputerObject
SetSetupOpen
GetCatalogObject
CheckMemoryGates
ComPlusMigrate
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ