Static task
static1
Behavioral task
behavioral1
Sample
54967f528b5c3aaa9eb6fdbca7d6361c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
54967f528b5c3aaa9eb6fdbca7d6361c.exe
Resource
win10v2004-20231215-en
General
-
Target
54967f528b5c3aaa9eb6fdbca7d6361c
-
Size
368KB
-
MD5
54967f528b5c3aaa9eb6fdbca7d6361c
-
SHA1
fb6b1411785981d2a9cd72247f8d6bc68d3a3a80
-
SHA256
ad1df964ca8ab55767169d540dbfe846d3678a3c192f97f326cb1fff4fcbb313
-
SHA512
f75c9b410da381c9e3d9ae045be5f4d8258bae3aee3c03e85433c7512cc12b2d5b377a73d709eae77a5f41113644da5815505cf1da0370a899a98241d32d05b3
-
SSDEEP
6144:iYOh4eBqC914OS1mxlGzAzHz2lPAgF76By978nLHXaVr:iYOhLb9WFzIbBy97YLH8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 54967f528b5c3aaa9eb6fdbca7d6361c
Files
-
54967f528b5c3aaa9eb6fdbca7d6361c.exe windows:4 windows x86 arch:x86
d846e3032cf24ae199b734a1f56e9b24
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDateFormatA
RaiseException
HeapFree
HeapReAlloc
HeapAlloc
VirtualAlloc
VirtualQuery
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetProcessHeap
ExitThread
HeapSize
GetACP
GetTimeZoneInformation
GetConsoleCP
GetConsoleMode
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
LCMapStringA
LCMapStringW
HeapDestroy
GetTimeFormatA
VirtualFree
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetStringTypeA
GetStringTypeW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetStdHandle
SetEnvironmentVariableA
GetSystemTimeAsFileTime
RtlUnwind
GetOEMCP
GetCPInfo
GetCurrentThread
GetLocaleInfoA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcmpW
GetFileTime
GetFileAttributesA
GlobalGetAtomNameA
GlobalFlags
lstrcmpA
GetModuleFileNameW
InterlockedDecrement
InterlockedIncrement
FileTimeToLocalFileTime
FileTimeToSystemTime
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
GetCurrentProcess
DuplicateHandle
GetThreadLocale
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
LoadLibraryA
CreateEventA
SuspendThread
SetEvent
GetCurrentThreadId
ResumeThread
SetThreadPriority
SetErrorMode
FreeLibrary
TlsFree
DeleteCriticalSection
PostQueuedCompletionStatus
GetExitCodeThread
CancelIo
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GetProcAddress
SetLastError
FormatMessageA
LocalFree
GetVersionExA
GlobalFree
GetFileSize
ReadFile
WriteFile
MulDiv
CreateFileA
DeviceIoControl
lstrlenA
CompareStringW
CompareStringA
GetVersion
MultiByteToWideChar
InterlockedExchange
CreateToolhelp32Snapshot
Process32First
Process32Next
WaitForSingleObject
GetProcessId
GlobalAlloc
GlobalLock
GlobalUnlock
CreateMutexA
GetLastError
CloseHandle
GetCommandLineA
GetCurrentProcessId
ExitProcess
GetModuleFileNameA
CreateThread
WideCharToMultiByte
FindResourceA
LoadResource
LockResource
SizeofResource
Sleep
HeapCreate
GetModuleHandleA
user32
GetMenuCheckMarkDimensions
ModifyMenuA
EnableMenuItem
CheckMenuItem
RegisterWindowMessageA
LoadIconA
WinHelpA
GetCapture
GetClassLongA
SetPropA
GetPropA
RemovePropA
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
GetMenu
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
DefWindowProcA
CallWindowProcA
SystemParametersInfoA
GetWindowPlacement
GetClassNameA
PtInRect
GetFocus
GetDlgCtrlID
IsWindow
SetWindowTextA
SetMenuItemBitmaps
GetDlgItem
UnhookWindowsHookEx
LoadCursorA
GetSysColorBrush
GetParent
IsWindowEnabled
SetWindowsHookExA
CallNextHookEx
GetActiveWindow
IsWindowVisible
SendMessageA
ValidateRect
EnableWindow
SetTimer
KillTimer
WaitMessage
PeekMessageA
GetSysColor
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
UnregisterClassA
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
wsprintfA
CopyRect
ClientToScreen
GetDesktopWindow
SetRect
VkKeyScanA
LoadKeyboardLayoutA
PostMessageA
CharUpperA
LoadBitmapA
GetTopWindow
GetWindowTextA
DestroyMenu
PostQuitMessage
GetWindow
GetWindowDC
SetClipboardData
MapVirtualKeyA
keybd_event
OpenClipboard
EmptyClipboard
CloseClipboard
IsIconic
AttachThreadInput
BringWindowToTop
SetActiveWindow
ReleaseDC
GetClientRect
GetKeyState
GetWindowThreadProcessId
FindWindowA
SetWindowPos
GetCursorPos
GetForegroundWindow
SetForegroundWindow
MessageBoxA
SetCursorPos
GetDC
LoadImageA
SetDlgItemTextA
CreateDialogParamA
ShowWindow
UpdateWindow
GetMessageA
TranslateMessage
DispatchMessageA
GetWindowLongA
SetWindowLongA
SetLayeredWindowAttributes
GetWindowRect
GetSystemMetrics
MoveWindow
EndDialog
GetLastActivePopup
gdi32
ExtTextOutA
Escape
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
SetMapMode
RectVisible
GetStockObject
PtVisible
CreateBitmap
CreateSolidBrush
RestoreDC
SaveDC
GetTextCharacterExtra
SetTextCharacterExtra
GetTextExtentPoint32A
SetBkColor
TextOutA
GetDeviceCaps
CreateDCA
CreateCompatibleBitmap
BitBlt
SetStretchBltMode
SetBrushOrgEx
StretchBlt
CreateICA
CreateCompatibleDC
CreateDIBSection
CreateFontA
SelectObject
GetCurrentObject
GetDIBits
GetObjectA
GetBitmapBits
DeleteObject
DeleteDC
SetTextColor
SetBkMode
GetClipBox
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
RegOpenKeyA
RegQueryValueExA
RegCloseKey
shell32
ShellExecuteExA
shlwapi
PathFindExtensionA
PathFileExistsA
PathStripToRootA
PathIsUNCA
PathFindFileNameA
ole32
CreateStreamOnHGlobal
oleaut32
VariantInit
OleLoadPicture
VariantClear
VariantChangeType
ws2_32
WSAStartup
ntohs
WSACleanup
closesocket
setsockopt
WSACloseEvent
accept
socket
select
gethostbyname
htonl
htons
inet_addr
bind
WSAGetLastError
getsockname
getpeername
WSASetLastError
connect
sendto
recvfrom
WSAAsyncSelect
send
recv
inet_ntoa
Sections
.text Size: 284KB - Virtual size: 281KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 60KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ