Static task
static1
Behavioral task
behavioral1
Sample
4abff5116ba2c3f93eddbc351382450c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4abff5116ba2c3f93eddbc351382450c.exe
Resource
win10v2004-20231215-en
General
-
Target
4abff5116ba2c3f93eddbc351382450c
-
Size
390KB
-
MD5
4abff5116ba2c3f93eddbc351382450c
-
SHA1
12ffe1101f8192b099c887022d93d935d0ff3f21
-
SHA256
56a65c6fc54d1d6f5b14bc3d0928ad5cb770302ef3227c0cd2e4086d2af243b0
-
SHA512
881e2adca64cac48abf3b6e20a59372acad946afa45a5b697daf6c0b1d6c1476eb83b5dcfb47a6977c61a997023a8ee20d8cfbf0d1ff59dc1872622750cce1b1
-
SSDEEP
6144:eqwD+X1xQatU+1CEJp4XEt8l3aw9Y6zfJvkeitTDYWMtrDVmCfNuI2RINhoDPnr:MO1xm+QoK0t4K3gCTDYWGrYzt+NST
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4abff5116ba2c3f93eddbc351382450c
Files
-
4abff5116ba2c3f93eddbc351382450c.exe windows:4 windows x86 arch:x86
e9e003478dc887aca98130ca0e752455
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetComputerNameA
CreateThread
FindVolumeClose
CreateFileA
Sleep
GetSystemTime
UnmapViewOfFile
GetTickCount
LoadLibraryW
ResetEvent
HeapCreate
SetLastError
GetCommandLineW
LocalUnlock
lstrlenA
CloseHandle
FormatMessageA
GetDiskFreeSpaceA
GetModuleHandleA
LocalFree
user32
DispatchMessageA
DrawStateA
GetComboBoxInfo
GetDlgItem
FillRect
CreateWindowExA
CheckRadioButton
DrawMenuBar
IsWindow
GetDC
DrawEdge
CallWindowProcA
SetFocus
advapi32
RegCloseKey
RegDeleteKeyA
FreeSid
RegEnumValueA
IsTokenUntrusted
hdwwiz.cpl
AddHardwareWizard
Sections
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 732KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ