Static task
static1
Behavioral task
behavioral1
Sample
53c4c1119e8fc951664645bea62604bb.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
53c4c1119e8fc951664645bea62604bb.exe
Resource
win10v2004-20231222-en
General
-
Target
53c4c1119e8fc951664645bea62604bb
-
Size
320KB
-
MD5
53c4c1119e8fc951664645bea62604bb
-
SHA1
95d5a927b588ea0a39adda2d00ba916d122d9c06
-
SHA256
33d71b16d8b39feb058afc0aba91b87c4479c44d698cf6e73b99dcd1bbf2dc2b
-
SHA512
fb2a2960979808fb30304610cd2583ab02d50c9d053c69a3390a320c8b9d0142ee3305786648c57596e9071f27b739233c6a693ab4a55c7141de8dbc651796f9
-
SSDEEP
6144:k3W5KDO+a5PzuarkYQzs/4kPipxEAY5Ol25sx1O:8W5yO+4XSsAkPyxFj1O
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 53c4c1119e8fc951664645bea62604bb
Files
-
53c4c1119e8fc951664645bea62604bb.exe windows:4 windows x86 arch:x86
055560cfb87fcba48810265434b612d1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetStdHandle
GetACP
PeekNamedPipe
SetMailslotInfo
FindCloseChangeNotification
GetStringTypeExW
SetVolumeLabelA
SizeofResource
ReadConsoleA
EraseTape
SetEndOfFile
WriteProcessMemory
GlobalFlags
MoveFileExA
ReadConsoleInputW
RemoveDirectoryA
SetConsoleWindowInfo
ReleaseMutex
GetCompressedFileSizeW
ReadDirectoryChangesW
FindFirstFileExW
WritePrivateProfileSectionW
SetEnvironmentVariableA
VirtualAllocEx
GlobalFindAtomA
SetThreadAffinityMask
GetConsoleCursorInfo
ReadFile
FormatMessageW
GetEnvironmentStringsW
VirtualLock
CreateEventA
GetLogicalDriveStringsA
WriteFile
SetSystemTime
SetThreadLocale
GetFileAttributesExA
SetProcessAffinityMask
LoadLibraryExA
CreateProcessA
SwitchToFiber
GetTapeStatus
GetFileAttributesA
ReadConsoleOutputA
CompareStringW
GetTimeZoneInformation
SetLastError
GetDateFormatA
FreeLibraryAndExitThread
FindNextChangeNotification
ExpandEnvironmentStringsW
VirtualProtect
FindResourceExW
RaiseException
QueryDosDeviceW
GetFileType
GetSystemTime
lstrcatW
SetNamedPipeHandleState
WritePrivateProfileSectionA
OpenMutexA
GetCurrentProcessId
GetCPInfo
FlushConsoleInputBuffer
CompareStringA
EnumSystemCodePagesW
ClearCommBreak
GlobalAddAtomW
GetCommandLineA
GetVersionExA
SetConsoleActiveScreenBuffer
ExitProcess
user32
GetScrollPos
HideCaret
GetDlgItem
SetDlgItemTextA
CreateWindowExA
IsWindowEnabled
GetMenuDefaultItem
SetMenuItemBitmaps
IsIconic
CopyAcceleratorTableW
UnregisterDeviceNotification
gdi32
SelectClipPath
GetWindowOrgEx
GetTextAlign
comdlg32
ChooseFontA
advapi32
LookupAccountNameA
GetSidLengthRequired
DeleteAce
SetSecurityInfo
RegQueryValueW
StartServiceCtrlDispatcherW
EnumDependentServicesW
RegOpenKeyExW
GetTokenInformation
RegEnumKeyW
LookupAccountSidA
shell32
FindExecutableA
Shell_NotifyIconA
DragQueryPoint
ExtractIconA
SHAddToRecentDocs
ole32
OleConvertIStorageToOLESTREAM
oleaut32
SafeArrayUnaccessData
VariantChangeType
LoadTypeLi
SetErrorInfo
LoadTypeLibEx
comctl32
PropertySheetW
ImageList_SetOverlayImage
ImageList_LoadImageW
shlwapi
StrPBrkW
StrFormatByteSize64A
PathAppendW
UrlCombineW
SHSetValueA
PathGetDriveNumberA
StrCmpNIW
PathIsUNCA
StrToIntExW
PathSkipRootW
PathRemoveBackslashA
StrTrimW
StrToIntW
setupapi
SetupDiDeleteDeviceInfo
SetupDiClassNameFromGuidExA
Sections
.text Size: 268KB - Virtual size: 266KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 44KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE