Static task
static1
Behavioral task
behavioral1
Sample
9ab236bc174a73778cf3d87ba6574d1d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9ab236bc174a73778cf3d87ba6574d1d.exe
Resource
win10v2004-20231215-en
General
-
Target
9ab236bc174a73778cf3d87ba6574d1d
-
Size
1.8MB
-
MD5
9ab236bc174a73778cf3d87ba6574d1d
-
SHA1
c4a48c8bae5694a73d7b9bc4f498c7b210d6d819
-
SHA256
12ed3a9c702063e5caaeda763ac4b06a0f03b409d6f7795599ef954a84e1002e
-
SHA512
ce780d009ea2125d8f324a1b13fe1fc7d534da127444ecdaf26f5ba45389f33d3353aea3f364e7e9c754feefb334b168c7a1cda0168e1a73d3034c8d0ee908fc
-
SSDEEP
49152:LqIVuRTTJ6fFmhMMMMMMMMMMMMMMMMMMFMW5lNTmLsQHCBRes:LsUfFQMMMMMMMMMMMMMMMMMMFMclNyg1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9ab236bc174a73778cf3d87ba6574d1d
Files
-
9ab236bc174a73778cf3d87ba6574d1d.exe windows:4 windows x86 arch:x86
9b0221e9e5dd27417576d6248816d756
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
OpenJobObjectA
LZClose
GetLogicalDriveStringsA
GetTempPathA
GetTickCount
GlobalFix
GetVolumePathNamesForVolumeNameA
CreateNamedPipeA
GetConsoleTitleA
CreateProcessA
OpenSemaphoreA
EndUpdateResourceA
GetTempFileNameA
DeviceIoControl
GetExitCodeProcess
ChangeTimerQueueTimer
GetPriorityClass
VirtualAllocEx
GetVolumePathNameA
GetConsoleOutputCP
GetNumberOfConsoleMouseButtons
RtlMoveMemory
EnumResourceNamesA
GetConsoleInputExeNameA
GetComputerNameA
OpenFileMappingA
HeapDestroy
SetVDMCurrentDirectories
CreateTimerQueue
IsDebuggerPresent
LocalAlloc
WaitForMultipleObjects
GetLastError
FormatMessageA
SetEvent
SetProcessPriorityBoost
GetProcessHeap
CopyFileExW
GetCurrentDirectoryA
dpmodemx
SPInit
advapi32
CredFree
user32
SystemParametersInfoA
UpdateLayeredWindow
FindWindowExW
GetClassNameA
MessageBeep
ToUnicode
DestroyWindow
GetWindow
SetWindowsHookExW
LoadLocalFonts
CharLowerA
GetInputDesktop
GetKeyState
MapVirtualKeyExA
GetMenuItemInfoA
CharToOemBuffA
DrawFrame
SetWindowStationUser
InflateRect
Sections
.text Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 645KB - Virtual size: 1001KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 321KB - Virtual size: 321KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 65KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ