Static task
static1
Behavioral task
behavioral1
Sample
53a06e86b64819a4b21977584c5ee1591c0299d45ebdaad1306b852c64ec5f89.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral2
Sample
53a06e86b64819a4b21977584c5ee1591c0299d45ebdaad1306b852c64ec5f89.exe
Resource
win7-20240221-en
Behavioral task
behavioral3
Sample
53a06e86b64819a4b21977584c5ee1591c0299d45ebdaad1306b852c64ec5f89.exe
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
53a06e86b64819a4b21977584c5ee1591c0299d45ebdaad1306b852c64ec5f89.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
53a06e86b64819a4b21977584c5ee1591c0299d45ebdaad1306b852c64ec5f89.exe
Resource
win11-20240412-en
General
-
Target
53a06e86b64819a4b21977584c5ee1591c0299d45ebdaad1306b852c64ec5f89
-
Size
566KB
-
MD5
0e182fa82cebb7c71134d22645d7181c
-
SHA1
620ce9d1e80005fa11747ed2223e79c710774c87
-
SHA256
53a06e86b64819a4b21977584c5ee1591c0299d45ebdaad1306b852c64ec5f89
-
SHA512
1d3cf14c638beff88eb06fcffbc22a1e7cfcbca3dd7c21d960f82a5f40f65a3469519cd35ac6960e1d9ef959208132ed362bd25ae612832baeced75ce003145a
-
SSDEEP
12288:Bz4ubZCXMtdUKat+YH7/yJ2je3rojGvB/WaEYvWc:pjOMtd1a/yl3KOjB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 53a06e86b64819a4b21977584c5ee1591c0299d45ebdaad1306b852c64ec5f89
Files
-
53a06e86b64819a4b21977584c5ee1591c0299d45ebdaad1306b852c64ec5f89.exe windows:4 windows x86 arch:x86
174266963e9a11ce6878050b21579fcf
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrlenA
GetLastError
GetModuleHandleA
VirtualAlloc
GetModuleFileNameA
ResetEvent
SetLastError
MultiByteToWideChar
ReadFile
InterlockedCompareExchange
LocalAlloc
OutputDebugStringW
QueryPerformanceFrequency
EncodePointer
CreateEventW
SetEvent
QueryPerformanceCounter
LoadLibraryA
GetFileAttributesW
lstrcpynW
HeapSetInformation
GetStartupInfoW
TerminateProcess
UnhandledExceptionFilter
IsDebuggerPresent
GetTickCount
GetSystemTimeAsFileTime
RaiseException
WaitForMultipleObjects
DecodePointer
GetCommandLineW
InterlockedExchange
ExitProcess
GetTempFileNameW
FreeLibrary
SetUnhandledExceptionFilter
GetCurrentProcess
CreateDirectoryW
WaitForSingleObject
LoadLibraryW
CreateFileW
GetProcAddress
GetCurrentThreadId
CloseHandle
DeleteFileW
GetCurrentProcessId
CreateThread
Sleep
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
ReleaseSemaphore
CreateSemaphoreW
DeleteCriticalSection
WriteFile
GetModuleFileNameW
GetFileSizeEx
GetLocalTime
LocalFree
OpenMutexW
FlushFileBuffers
CreateFileA
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetFilePointer
CreateMutexW
ReleaseMutex
InterlockedDecrement
GetModuleHandleW
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
InterlockedIncrement
WideCharToMultiByte
RtlUnwind
LCMapStringA
LCMapStringW
GetCPInfo
GetStringTypeW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
HeapCreate
VirtualFree
GetACP
GetOEMCP
IsValidCodePage
GetLocaleInfoA
GetStringTypeA
InitializeCriticalSectionAndSpinCount
GetConsoleCP
GetConsoleMode
SetStdHandle
user32
GetClipboardData
CharNextA
GetWindowDC
GetAsyncKeyState
IsMenu
IsCharAlphaNumericW
CharLowerA
IsCharLowerA
DestroyIcon
GetTopWindow
IsGUIThread
OpenIcon
GetMenu
EnumClipboardFormats
GetMenuItemCount
GetKeyState
LoadCursorW
GetKeyboardLayout
wsprintfW
gdi32
DeleteObject
GetStockObject
FlattenPath
GetDCBrushColor
EndPage
CreateHalftonePalette
AbortPath
WidenPath
GetEnhMetaFileW
GetEnhMetaFileBits
advapi32
RegOpenKeyExA
RegSetValueExA
RegCloseKey
RegOpenKeyW
CloseServiceHandle
OpenSCManagerW
OpenServiceW
ChangeServiceConfigW
StartServiceW
QueryServiceStatusEx
shell32
SHGetSpecialFolderPathW
SHGetFolderPathW
Shell_NotifyIconW
ShellExecuteW
ShellExecuteExW
SHFileOperationW
SHLoadNonloadedIconOverlayIdentifiers
DragAcceptFiles
SHQueryRecycleBinA
SHBrowseForFolder
ShellExecuteEx
ExtractAssociatedIconExA
DragFinish
SHGetMalloc
SHChangeNotify
SHBrowseForFolderA
DragQueryFileW
SHGetSpecialFolderPathA
ExtractAssociatedIconExW
CheckEscapesW
ExtractIconW
FindExecutableW
DoEnvironmentSubstA
SHInvokePrinterCommandA
SHGetIconOverlayIndexA
SHCreateDirectoryExA
SHCreateProcessAsUserW
shlwapi
PathAppendW
PathRemoveFileSpecW
AssocQueryStringW
StrStrIA
StrRStrIA
StrChrA
StrChrIA
StrRChrIA
StrRChrW
StrStrIW
SHSetValueW
SHGetValueW
Sections
.text Size: 387KB - Virtual size: 386KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text3 Size: 107KB - Virtual size: 107KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text2 Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data3 Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ