Static task
static1
Behavioral task
behavioral1
Sample
53b6b3e279160265f96c331f14f6c2e4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
53b6b3e279160265f96c331f14f6c2e4.exe
Resource
win10v2004-20231222-en
General
-
Target
53b6b3e279160265f96c331f14f6c2e4.exe
-
Size
392KB
-
MD5
53b6b3e279160265f96c331f14f6c2e4
-
SHA1
45a897641e92b1fb770257971c79c8177a874cc2
-
SHA256
8e8f69ed5b9b752edf5c378d8a1b14107f07f431f46c951a40f1b72d9928b1b6
-
SHA512
87b044a99763f454849ede6a6b6c4b4f7c4eca0fac1625a135b2aaffdef1d5bce0cdc0b95fe94e71cb9d82e03d3382463898b7a25b797f51688ddc800f08f586
-
SSDEEP
6144:bVzTqUkqkFwzgVq767LkLbv1P/AxrvNCBeq0fG5bfAYSR6VbysZk1dWyRr3dia6p:HCJibvNYJbxYYgbRke6DIa6zV0y
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 53b6b3e279160265f96c331f14f6c2e4.exe
Files
-
53b6b3e279160265f96c331f14f6c2e4.exe.exe windows:4 windows x86 arch:x86
88b5754292e2e5c47126dd9d0bf8fd5c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
GlobalFree
HeapDestroy
CreateMutexA
FreeEnvironmentStringsA
CreateFileA
ExitProcess
SetVolumeMountPointA
LocalUnlock
TlsGetValue
GetACP
SetLastError
UnmapViewOfFile
LoadLibraryExA
FreeConsole
HeapCreate
FindClose
FindResourceA
Sleep
GetLastError
user32
DefWindowProcW
DispatchMessageA
CheckRadioButton
GetFocus
FillRect
DrawMenuBar
GetIconInfo
GetDC
DrawEdge
CallWindowProcA
CopyRect
IsWindow
GetDlgItem
uxtheme
DrawThemeIcon
GetThemeRect
DrawThemeEdge
GetThemeSysInt
DrawThemeText
clbcatq
SetupOpen
Sections
.text Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ