Static task
static1
Behavioral task
behavioral1
Sample
55fa3e1d57972d10f0de63938b45dbe5.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
55fa3e1d57972d10f0de63938b45dbe5.exe
Resource
win10v2004-20231215-en
General
-
Target
55fa3e1d57972d10f0de63938b45dbe5
-
Size
646KB
-
MD5
55fa3e1d57972d10f0de63938b45dbe5
-
SHA1
2370c04f2b176e3a96313368daf376e55cc6b301
-
SHA256
a21b5bd61c9355837fc0956a71e55294402a47b0e6700ea586073004d42d27c5
-
SHA512
62e231b7b6bef41424b67c01933675debc0850342f4e8de37d9ddde1f77314a0910b4ecfdb8f42e669825b81f3fcff39f2cd2bcf99fd94d9cb8ac1b389725267
-
SSDEEP
6144:K22caelrduIkYe8I7kW/EI3HQZMlZ3OlunFvUF8M8rFa/G7+UIB:jaelrdrskwE/+gavVHrFa1B
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 55fa3e1d57972d10f0de63938b45dbe5
Files
-
55fa3e1d57972d10f0de63938b45dbe5.exe windows:4 windows x86 arch:x86
e147985f40c919756fc7185d46646425
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
CreateEllipticRgnIndirect
CreateEllipticRgn
shell32
Shell_NotifyIconA
FindExecutableA
advapi32
LookupPrivilegeDisplayNameA
SetNamedSecurityInfoW
ClearEventLogW
BuildSecurityDescriptorW
ControlService
GetSidLengthRequired
RegCreateKeyExA
GetExplicitEntriesFromAclW
OpenEventLogW
RegEnumKeyExA
EnumServicesStatusA
SetFileSecurityA
MakeSelfRelativeSD
NotifyChangeEventLog
AccessCheck
oleaut32
SafeArrayGetElement
SetErrorInfo
SysFreeString
kernel32
GetPrivateProfileSectionW
CreateEventA
_lread
LocalAlloc
IsBadReadPtr
EraseTape
ExitProcess
FindCloseChangeNotification
GetVersion
LeaveCriticalSection
FindResourceExA
GetComputerNameW
GetStartupInfoA
GetModuleHandleA
GetLongPathNameA
GetACP
SetFileAttributesA
SetCommMask
ReadConsoleA
FormatMessageA
SetFileTime
GetCommConfig
GetUserDefaultLangID
EnumCalendarInfoW
FindNextChangeNotification
FindFirstFileExW
WriteConsoleOutputW
ReadDirectoryChangesW
GetLocaleInfoW
GlobalFindAtomW
SetConsoleOutputCP
IsDBCSLeadByteEx
LCMapStringA
GetShortPathNameA
VirtualProtect
GetTapeStatus
GetDriveTypeA
GetTimeZoneInformation
GetUserDefaultLCID
SetMailslotInfo
FindResourceExW
QueryDosDeviceW
VirtualQuery
DuplicateHandle
GetSystemInfo
ConnectNamedPipe
WritePrivateProfileStructA
GetSystemDefaultLangID
ReadFileScatter
_lclose
GetVolumeInformationW
FillConsoleOutputCharacterA
GetSystemDirectoryW
GetBinaryTypeW
OpenSemaphoreW
comdlg32
GetSaveFileNameA
PageSetupDlgA
user32
SetFocus
SetUserObjectInformationW
WindowFromDC
EnumDisplayMonitors
GetMenuState
CheckRadioButton
ActivateKeyboardLayout
DrawMenuBar
PostQuitMessage
GetClipCursor
SetCursor
GetMonitorInfoW
InsertMenuItemA
wsprintfA
ScreenToClient
GetSysColorBrush
RemovePropA
GetClientRect
DrawTextW
CreateWindowExA
OemToCharBuffW
MessageBoxIndirectW
GetClassInfoW
DialogBoxIndirectParamA
HideCaret
DestroyCursor
SendInput
SetCaretBlinkTime
GetCursor
SetWindowsHookExA
GetWindowLongW
UnhookWindowsHookEx
BeginDeferWindowPos
msvcrt
_wsystem
strpbrk
_popen
_unlink
_fdopen
mbstowcs
_mbschr
_open_osfhandle
wcsftime
_vsnwprintf
_wremove
iswascii
_wputenv
Sections
.text Size: 304KB - Virtual size: 304KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 326KB - Virtual size: 326KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ