Static task
static1
Behavioral task
behavioral1
Sample
53bbc9afa57a10db1995dfe63c7a1d14.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
53bbc9afa57a10db1995dfe63c7a1d14.exe
Resource
win10v2004-20231215-en
General
-
Target
53bbc9afa57a10db1995dfe63c7a1d14
-
Size
78KB
-
MD5
53bbc9afa57a10db1995dfe63c7a1d14
-
SHA1
4af2afc3d30443fdf439cd1803cced2a72a46886
-
SHA256
562826bffa99787a7e5a0ff1dc274b361909287bd444018418d1941fe783c714
-
SHA512
c301a845af11aee4f8dfa92c96596d49bc502dc33f43d512c6c9563e1c4ac58bca2548ad51b2e22d32bfdec49f3c4e2fa2a8b9505733caef5d32d471ad843459
-
SSDEEP
1536:QLwhkBDwe60cyhpkdsQwCFiwybAO2QLu1/gjb6sMk0WJBO2prsLFLwKh:QLmkg0YdsQwCWZk1ojZzW2QLFLl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 53bbc9afa57a10db1995dfe63c7a1d14
Files
-
53bbc9afa57a10db1995dfe63c7a1d14.exe windows:4 windows x86 arch:x86
69ad7f21427b265ad552dbd9df6734f9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
DeviceIoControl
CreateFileA
GetVolumeInformationA
ExitProcess
TerminateProcess
SetProcessPriorityBoost
SetThreadPriority
GetCurrentThread
SetPriorityClass
GetCurrentProcess
GetEnvironmentVariableA
GetShortPathNameA
GetModuleFileNameA
IsBadWritePtr
GetComputerNameA
WriteFile
lstrlenA
GetLastError
OpenProcess
GetTickCount
lstrcatA
GetVersionExA
Sleep
GetTempPathA
lstrcpyA
CreateProcessA
user32
wsprintfA
SendMessageA
FindWindowA
shell32
ShellExecuteExA
SHGetSpecialFolderPathA
SHChangeNotify
msvcrt
sprintf
atol
strncpy
atoi
rand
??3@YAXPAX@Z
??2@YAPAXI@Z
strstr
__CxxFrameHandler
strncat
_strdup
_except_handler3
msvcp60
?_Tidy@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEX_N@Z
?_Grow@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAE_NI_N@Z
?npos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@2IB
?_Xlen@std@@YAXXZ
??1?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAE@XZ
?_Eos@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@AAEXI@Z
?_C@?1??_Nullstr@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@CAPBDXZ@4DB
?assign@?$basic_string@DU?$char_traits@D@std@@V?$allocator@D@2@@std@@QAEAAV12@PBDI@Z
shlwapi
PathGetDriveNumberA
wininet
InternetReadFile
HttpQueryInfoA
InternetOpenUrlA
InternetOpenA
InternetCloseHandle
Sections
.text Size: 74KB - Virtual size: 77KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ