Static task
static1
Behavioral task
behavioral1
Sample
53b0cb99936ccd67d915638044bca664.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
53b0cb99936ccd67d915638044bca664.exe
Resource
win10v2004-20231215-en
General
-
Target
53b0cb99936ccd67d915638044bca664.exe
-
Size
43KB
-
MD5
53b0cb99936ccd67d915638044bca664
-
SHA1
39dad308d2a7b512ccf6ebe2dd836824fb2a6126
-
SHA256
49c9c2b67c2a2f7d9f9f4fe138da6b91df9886e1f1a49d4fd458207ea7735f51
-
SHA512
29d5c8df08427366171fc1f902520d05468850d709a0564571b7b6fd79043630f237110ea3ab37d5fadfe10572048ed985a4cf2160fe2a58408a601f27c79f23
-
SSDEEP
768:8pvpz9/nZZnyLiXrOKGJ2AkE+cDHE0yN6jcY2dpjPD6qhxZHzuo1vVYV0wRm:8pvnnO0ryzkaEFzTd56qh/HzuoRVYP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 53b0cb99936ccd67d915638044bca664.exe
Files
-
53b0cb99936ccd67d915638044bca664.exe.exe windows:5 windows x86 arch:x86
7da49e7ec9f217d3ae490d7f43fc9abc
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FlushFileBuffers
lstrlenA
UnmapViewOfFile
CreateFileMappingW
CreateThread
GlobalLock
CloseHandle
GetTempPathW
WriteFile
ReleaseMutex
lstrcmpiA
GetModuleFileNameA
FindClose
SetEvent
CopyFileW
SetEndOfFile
SetThreadPriority
GetSystemTime
OpenProcess
HeapFree
GetDriveTypeW
GetCommandLineA
lstrcpynW
lstrcatW
HeapAlloc
SetLastError
EnterCriticalSection
ExpandEnvironmentStringsW
CreateProcessW
MultiByteToWideChar
user32
GetDlgItem
PeekMessageA
DrawIcon
Sections
.wbeb Size: 35KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gjkpkn Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tsreh Size: 4KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ