Static task
static1
Behavioral task
behavioral1
Sample
53c5455b0f096809704f985ad8cd29ca.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
53c5455b0f096809704f985ad8cd29ca.exe
Resource
win10v2004-20231215-en
General
-
Target
53c5455b0f096809704f985ad8cd29ca
-
Size
45KB
-
MD5
53c5455b0f096809704f985ad8cd29ca
-
SHA1
54c32cb5567981f82481d81a79d8b216717b613e
-
SHA256
105ea2896672ce92984e5cdc917ab9de1b30635f140b4904cfdd4233b6b25a9a
-
SHA512
700c166c29f7f8403ca6267a9066504d1f0df7130e2f44b771527d400a41292cb866b40ee669dc2a882c47ad85bbd838cec3c47141100a19d553411521778642
-
SSDEEP
768:93A3P3V3AV297zO3FnvPbz3kUp8GCi0SWKqxzY2ztdvSrMqa35t+ZXqfHBniyyfy:93A3P3V3AVpZbz3VWKqRYWtdCa3f8qfk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 53c5455b0f096809704f985ad8cd29ca
Files
-
53c5455b0f096809704f985ad8cd29ca.exe windows:4 windows x86 arch:x86
c0d5a15991fbbee70da0f6fdf7e75a36
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
CreateFileA
FindAtomA
lstrcmpA
lstrlenA
GetModuleFileNameA
lstrcpynA
CreateMutexA
CloseHandle
GetVersion
GetTickCount
GetTempPathA
GetSystemTime
WriteFile
lstrcpyA
GetCommandLineA
CreateProcessA
lstrcatA
GetLastError
GetProcAddress
VirtualAlloc
GetTempFileNameA
GetLocalTime
LoadLibraryA
OpenMutexA
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
VirtualQuery
GetVersionExA
RtlUnwind
IsDebuggerPresent
user32
wsprintfA
ClientToScreen
GetCursorPos
GetCaretPos
EqualRect
GetWindowRect
IsWindowVisible
GetFocus
InflateRect
Sections
.text Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE