Static task
static1
Behavioral task
behavioral1
Sample
50de5130349c8555c52b5c7998ac6334.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
50de5130349c8555c52b5c7998ac6334.exe
Resource
win10v2004-20231215-en
General
-
Target
50de5130349c8555c52b5c7998ac6334
-
Size
753KB
-
MD5
50de5130349c8555c52b5c7998ac6334
-
SHA1
5be1a13907b11b7d2f02a0b343bedc7725235cfe
-
SHA256
22cd96dd83148a327663722aa4de9229e0d91e56ac1eb4604f4aeecbf74b2232
-
SHA512
70d9627fad7d312efa8642398647c0e759b7d21e59bf065f955fcae829e5e8465dae2c8b6d42d5366f37c157d8eab477728d6c9393739842ac538be030d6ac22
-
SSDEEP
12288:dZ3ji+iDYpz6FZxu0h39x6Msv/n9M6kYYd0+KJ/EN55tZm0PXtUDSJ6A:dZWjD8iWENxO/9M6kYY1KJ/wDbzESJF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 50de5130349c8555c52b5c7998ac6334
Files
-
50de5130349c8555c52b5c7998ac6334.exe windows:4 windows x86 arch:x86
b6b1151aad37f76e2226391109dc2e29
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
SetEvent
HeapDestroy
GetTickCount
WriteConsoleA
OpenThread
OpenEventW
GetCommandLineW
SuspendThread
GetStartupInfoA
CloseHandle
ReleaseMutex
DeleteFileA
CloseHandle
HeapCreate
GetModuleHandleA
FindClose
GetEnvironmentVariableW
FindResourceExA
GetFileAttributesA
user32
PeekMessageA
GetSysColor
GetWindowLongA
GetIconInfo
CallWindowProcW
DispatchMessageA
DispatchMessageA
GetKeyState
IsZoomed
CreateIcon
GetClassInfoA
FindWindowA
SetFocus
htui
HTUI_ColorAdjustment
HTUI_ColorAdjustment
HTUI_ColorAdjustment
HTUI_ColorAdjustment
Sections
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 512B - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 744KB - Virtual size: 744KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ