Static task
static1
Behavioral task
behavioral1
Sample
53f8771741bc040196d415547d9c8395.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
53f8771741bc040196d415547d9c8395.exe
Resource
win10v2004-20231215-en
General
-
Target
53f8771741bc040196d415547d9c8395
-
Size
17KB
-
MD5
53f8771741bc040196d415547d9c8395
-
SHA1
8a96238c77152f2e5261439ba8b14463651c2b7a
-
SHA256
92d4a288870e324bed979543c22ef3292871bc368b53bd9cadf52d33d01a3a64
-
SHA512
9bcefaa35e6a138cefd866dea946c842ac95feb7dd7ba25d1df821c28fbe6172cbb25ce6c51312dbb8f5db71239c74b5aa0831a8e082e4a3df7896c3994b1696
-
SSDEEP
384:pvByVuoXnx8paTkTradWlgHbiSWbVOBkvt1FSKK2M62:pv/oXnx8plK/HOSWhOObLx
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 53f8771741bc040196d415547d9c8395
Files
-
53f8771741bc040196d415547d9c8395.exe windows:4 windows x86 arch:x86
1787b88b146cf5bdd4062d80f8e19b6a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_NO_BIND
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetNamedPipeHandleStateW
GetShortPathNameA
FatalAppExitA
CompareStringA
GetSystemDirectoryA
WriteConsoleInputVDMA
GetConsoleTitleA
GetFileAttributesA
GetTempPathA
FreeEnvironmentStringsA
user32
IsDialogMessageA
GetWindowTextA
DlgDirListComboBoxA
LoadBitmapA
GetClassLongA
GetClassInfoA
GrayStringA
gdi32
GetMetaFileA
EnumICMProfilesW
RemoveFontResourceW
GetTextExtentPointA
Sections
.data? Size: 12KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.masm Size: 1024B - Virtual size: 854B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 711B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ