Static task
static1
Behavioral task
behavioral1
Sample
ab3e12a6211b890a5bd766723953cb18822c85902a2d81463d1b9f58551c67c6.exe
Resource
win7-20230220-en
General
-
Target
ab3e12a6211b890a5bd766723953cb18822c85902a2d81463d1b9f58551c67c6
-
Size
5.5MB
-
MD5
1864bad60a4dd284ab7387fb713db447
-
SHA1
ef9f00670d6fe9dc2a9572c8c0bfb7f54f816d8e
-
SHA256
ab3e12a6211b890a5bd766723953cb18822c85902a2d81463d1b9f58551c67c6
-
SHA512
32c34bfe5fca0e23d202042f7de3195a8fb90521e638d5b414c823c165d398066f3eb865fbc2657a55b0f8d2f0d2418728730bedb423acd7bc213b8d9a1fefcb
-
SSDEEP
98304:FyiNIYiwOBpIeWRsTpLhd872XEzeBbbUkVVkfhoPGYD0/r0g:ni1zwRsTpVd877zEbQhocn
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource ab3e12a6211b890a5bd766723953cb18822c85902a2d81463d1b9f58551c67c6
Files
-
ab3e12a6211b890a5bd766723953cb18822c85902a2d81463d1b9f58551c67c6.exe windows x86
d21daaf6f40f245d9de6c7481dea743c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVersionExW
GetSystemDirectoryW
GetLastError
CloseHandle
LocalFree
GetComputerNameW
CreateProcessW
GetModuleFileNameW
CreateMutexW
ReleaseMutex
Sleep
GetLocalTime
ExitProcess
InterlockedDecrement
MulDiv
ReadFile
CreateFileW
GetCurrentDirectoryW
SetEndOfFile
HeapSize
ReadConsoleW
WriteConsoleW
GetTimeZoneInformation
GetProcessHeap
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
WriteFile
WaitForSingleObject
GetVolumeInformationW
FindResourceW
LoadResource
LockResource
SizeofResource
WideCharToMultiByte
MultiByteToWideChar
GetTempPathW
IsValidCodePage
FindNextFileA
FindFirstFileExA
FindClose
SetFilePointerEx
GetConsoleMode
GetConsoleCP
FlushFileBuffers
SetStdHandle
GetFullPathNameW
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetTimeFormatW
GetDateFormatW
HeapFree
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
GetModuleHandleW
GetProcAddress
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
EncodePointer
DecodePointer
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStringTypeW
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
FreeLibrary
LoadLibraryExW
RaiseException
RtlUnwind
GetDriveTypeW
GetFileType
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
CreateThread
ExitThread
FreeLibraryAndExitThread
GetModuleHandleExW
GetModuleFileNameA
GetStdHandle
GetACP
HeapAlloc
HeapReAlloc
user32
CreateWindowExW
GetClientRect
wsprintfW
LoadCursorW
GetDC
ShowWindow
SetRect
ReleaseDC
GetMessageW
DefWindowProcW
PostMessageW
MessageBoxW
DispatchMessageW
RegisterClassW
TranslateMessage
gdi32
GetDeviceCaps
advapi32
RegCreateKeyExW
RegSetValueExW
ConvertSidToStringSidW
LookupAccountNameW
RegCloseKey
shell32
SHCreateDirectoryExW
SHGetFolderPathW
ole32
CoInitializeEx
CoCreateInstance
OleSetContainedObject
OleCreate
OleLockRunning
CoUninitialize
OleInitialize
oleaut32
SysFreeString
SysAllocString
VariantClear
Sections
.text Size: 295KB - Virtual size: 294KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 165KB - Virtual size: 165KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ