Static task
static1
Behavioral task
behavioral1
Sample
f53ffca96b39243d4395f52da78f357077fc9e8e9e2501ff2d255002f46f988e.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
f53ffca96b39243d4395f52da78f357077fc9e8e9e2501ff2d255002f46f988e.exe
Resource
win10v2004-20240412-en
General
-
Target
f53ffca96b39243d4395f52da78f357077fc9e8e9e2501ff2d255002f46f988e
-
Size
28KB
-
MD5
011e3df796fec577aed78d43708aa61e
-
SHA1
1f4b98b20065fafe8ef385bf63afa4bd40b9b5b6
-
SHA256
f53ffca96b39243d4395f52da78f357077fc9e8e9e2501ff2d255002f46f988e
-
SHA512
3926a72a7c4b874d50612b174ca98d13dd98fb1d6bee8b15920da7d51e93edd0135c79e43aa4761a8aaa290268de6e4ff9ec29e76dc9557184ead573eefd1793
-
SSDEEP
768:ay5dA+D+Q7ZEE8K413vfdHldhwyEGVeTmNL:VdA+S/lJ13vfdHldhwAeoL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f53ffca96b39243d4395f52da78f357077fc9e8e9e2501ff2d255002f46f988e
Files
-
f53ffca96b39243d4395f52da78f357077fc9e8e9e2501ff2d255002f46f988e.exe windows:4 windows x86 arch:x86
5bafb291df732bd8895bcff11e861198
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Sleep
VirtualAlloc
SizeofResource
lstrlenW
LockResource
LoadResource
GetModuleHandleA
GetCommandLineA
FindResourceA
VirtualFree
ExitProcess
user32
GetMessageA
GetSystemMetrics
LoadCursorA
PostQuitMessage
ReleaseDC
SendMessageA
ShowWindow
TranslateMessage
UpdateWindow
EndPaint
DispatchMessageA
DefWindowProcA
CreateWindowExA
BeginPaint
RegisterClassExA
GetDC
gdi32
CreateCompatibleBitmap
CreateCompatibleDC
DeleteDC
DeleteObject
SelectObject
BitBlt
Sections
.text Size: 7KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 928B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 296B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ