Static task
static1
Behavioral task
behavioral1
Sample
54a5edf13bffb19d84c3abb09faec624.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
54a5edf13bffb19d84c3abb09faec624.exe
Resource
win10v2004-20231215-en
General
-
Target
54a5edf13bffb19d84c3abb09faec624
-
Size
40KB
-
MD5
54a5edf13bffb19d84c3abb09faec624
-
SHA1
df838dc475d37a1b1c6726b12d5caaa45006c116
-
SHA256
7b8ea44ab14416bfcb80b5799aaf170d955c7d889c8aabbf0f16925c55d51909
-
SHA512
1f32a84bb5882c3414f4b2d4018363eba2c0506332df9f7f3e20afc85a31649c4ec99d2efa1fd75c1120c2c31cb88481a77daea94087347f2743fe64edd2cb9e
-
SSDEEP
768:U5CqCoRcrizjZpPD1lwGVUxQfXIvQvJJ57FbSfRsI2STcvMLXjlgQhVuzdoTlIdn:U5CqCGcrizfD1l7zH5hbSfRsI1TI2pgV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 54a5edf13bffb19d84c3abb09faec624
Files
-
54a5edf13bffb19d84c3abb09faec624.exe windows:4 windows x86 arch:x86
f51d6816940719c6228ac4aba74cd0f7
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
OpenSemaphoreW
FindNextFileA
GetTempFileNameA
GetFileSizeEx
lstrcmpiW
GetCurrentProcess
ExitVDM
GetPrivateProfileIntW
PrepareTape
EnumResourceTypesA
SetVolumeMountPointW
GetNumberOfConsoleFonts
SetComputerNameW
ExitProcess
GetHandleInformation
GlobalFindAtomW
user32
ResolveDesktopForWOW
UnloadKeyboardLayout
CharToOemA
GetKBCodePage
GetSystemMenu
ChangeMenuW
InSendMessage
TranslateMessageEx
MBToWCSEx
DrawTextW
MonitorFromWindow
DrawFrame
GetTabbedTextExtentW
VkKeyScanW
CreateDialogIndirectParamAorW
VkKeyScanExA
GetMenuItemRect
ChildWindowFromPoint
ChangeClipboardChain
ChangeDisplaySettingsW
Sections
.text Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 6KB - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE