Static task
static1
Behavioral task
behavioral1
Sample
ab8ec5618e64b50c2217efae5d4bf4fa037535113b344f8b6f89291f4b1ee67b.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
ab8ec5618e64b50c2217efae5d4bf4fa037535113b344f8b6f89291f4b1ee67b.exe
Resource
win10v2004-20230831-en
General
-
Target
ab8ec5618e64b50c2217efae5d4bf4fa037535113b344f8b6f89291f4b1ee67b
-
Size
1.2MB
-
MD5
b6063da1d9ab1cf51f89d00a654424d2
-
SHA1
acbfa001c179d849fceea81b7b58689156f4a6b8
-
SHA256
ab8ec5618e64b50c2217efae5d4bf4fa037535113b344f8b6f89291f4b1ee67b
-
SHA512
72bd5cee859d3133bdd5de2baa3db8a9bfc7f74286958f1246b9273a40216764353df7dfb1ac2558773632c3cdf1ed7b0508236cb6f694eb764e1c7e149bf8ec
-
SSDEEP
24576:ktU+CaFK8L+67WG0dQjEWXxipm98sCPVeLVur9+4UB:fcFK3DdAEq98soeLV4mB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ab8ec5618e64b50c2217efae5d4bf4fa037535113b344f8b6f89291f4b1ee67b
Files
-
ab8ec5618e64b50c2217efae5d4bf4fa037535113b344f8b6f89291f4b1ee67b.exe windows x86
76044d9a4872366c43a1f3c1563bb38d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAlloc
user32
PostThreadMessageA
gdi32
GetStockObject
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
advapi32
RegCloseKey
comctl32
ImageList_GetImageCount
oledlg
ord8
ole32
OleInitialize
olepro32
ord253
oleaut32
SysFreeString
msvcrt
strncpy
iphlpapi
GetInterfaceInfo
psapi
GetMappedFileNameW
shell32
SHGetFolderPathW
Sections
.text Size: 192KB - Virtual size: 416KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.sedata Size: 956KB - Virtual size: 956KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.sedata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ