Static task
static1
Behavioral task
behavioral1
Sample
53e42732d7442acb9e598a5f07a52d93.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
53e42732d7442acb9e598a5f07a52d93.exe
Resource
win10v2004-20231215-en
General
-
Target
53e42732d7442acb9e598a5f07a52d93
-
Size
2.9MB
-
MD5
53e42732d7442acb9e598a5f07a52d93
-
SHA1
0b68b4ff11fba96d91fb1dbda0a4e521deae3dd5
-
SHA256
dec6d2e25a4c1d863689408a45c225018478aad87b3e327b0c4f583e0949ab78
-
SHA512
cde510e4a0b01b1372fe868ada216fe59e7de2f4347f522141e1af8de6534d635999c780e6b7c973f8c2b2e90defbca457535b79c36135835b9e284b48eb355b
-
SSDEEP
49152:0WQ+aaLcrBhjzLrODC/TkgOQGgokxJ5Vo8QPWRN0zR6Ii3pc2mg0O86Z4:03XaArvjzXO2LtOQGgouknPWRN933pKu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 53e42732d7442acb9e598a5f07a52d93
Files
-
53e42732d7442acb9e598a5f07a52d93.exe windows:5 windows x86 arch:x86
9826508358bdeb707d589d3957821389
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcrt
_controlfp
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_except_handler3
sqlite3
sqlite3_errstr
sqlite3_extended_errcode
kernel32
CreateToolhelp32Snapshot
WriteFile
WideCharToMultiByte
WaitForSingleObject
WaitForMultipleObjects
VirtualFree
Process32NextW
UnhandledExceptionFilter
TlsSetValue
TlsGetValue
TlsFree
TerminateThread
TerminateProcess
Sleep
GetStartupInfoA
VirtualAlloc
GetVersion
ExitProcess
LoadLibraryA
LeaveCriticalSection
GetTickCount
EnterCriticalSection
InitializeCriticalSection
GetCurrentProcessId
QueryPerformanceCounter
GetCurrentThreadId
GetProcAddress
GetModuleHandleA
GetACP
CopyFileW
CreateDirectoryW
CreateEventW
CreateFileW
CreatePipe
CreateProcessW
DeleteCriticalSection
DeleteFileA
DeleteFileW
DeviceIoControl
DuplicateHandle
FindClose
FindFirstFileW
FindNextFileW
FindResourceExW
FindResourceW
FlushInstructionCache
FormatMessageW
GetDriveTypeW
GetExitCodeProcess
GetFileAttributesW
GetFileSize
GetFullPathNameW
GetLastError
GetLogicalDrives
GetModuleFileNameW
GetPrivateProfileIntW
GetPrivateProfileStringW
GetProcessHeap
GetShortPathNameW
GetStartupInfoW
GetSystemInfo
GetSystemTimeAsFileTime
GetTempPathW
GetVersionExW
GetVolumeInformationW
GetWindowsDirectoryW
GlobalAlloc
GlobalFree
GlobalLock
GlobalSize
GlobalUnlock
HeapAlloc
HeapDestroy
HeapFree
HeapReAlloc
HeapSize
InterlockedCompareExchange
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
IsProcessorFeaturePresent
LoadLibraryW
LoadResource
LocalFree
LockResource
lstrcatW
lstrcpynW
lstrcpyW
lstrlenA
lstrlenW
MoveFileExW
MultiByteToWideChar
OutputDebugStringA
PeekNamedPipe
QueryPerformanceFrequency
RaiseException
ReadFile
SetErrorMode
SetEvent
SetLastError
SetPriorityClass
SetUnhandledExceptionFilter
SizeofResource
TlsAlloc
user32
InsertMenuW
GetWindowLongW
BeginPaint
CallWindowProcW
CharLowerBuffW
CharNextW
CheckMenuItem
ClientToScreen
CloseClipboard
CopyRect
CreateWindowExW
DefWindowProcW
DeleteMenu
DestroyMenu
DestroyWindow
DialogBoxParamW
DispatchMessageW
DrawEdge
DrawFocusRect
DrawIconEx
EnableMenuItem
EnableWindow
EndDialog
EndPaint
ExitWindowsEx
FillRect
GetActiveWindow
GetCapture
GetClassLongW
GetClientRect
GetClipboardData
GetDC
GetDlgCtrlID
GetDlgItem
GetDoubleClickTime
GetIconInfo
GetKeyState
GetMenuItemCount
GetSubMenu
GetSysColorBrush
GetSystemMetrics
GetWindowDC
GetWindowPlacement
GetWindowRect
InflateRect
GetParent
InvalidateRect
IsClipboardFormatAvailable
IsIconic
IsRectEmpty
IsWindow
IsWindowEnabled
IsZoomed
KillTimer
LoadBitmapW
LoadCursorW
LoadMenuW
LoadStringW
MapWindowPoints
MessageBeep
MessageBoxW
MoveWindow
OffsetRect
OpenClipboard
PeekMessageW
PostMessageW
PostQuitMessage
PtInRect
ReleaseCapture
ReleaseDC
ScreenToClient
SendMessageW
SetCapture
SetClassLongW
SetCursor
SetFocus
SetMenuItemBitmaps
SetRect
SetTimer
SetWindowLongW
SetWindowPlacement
SetWindowPos
SetWindowTextW
ShowWindow
SystemParametersInfoW
TrackPopupMenu
UnregisterClassA
UpdateWindow
wsprintfW
wvsprintfW
ws2_32
send
Sections
.text Size: 2.3MB - Virtual size: 2.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 14.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ride Size: 556KB - Virtual size: 555KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 100KB - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ