Static task
static1
Behavioral task
behavioral1
Sample
ab0351109b34f4003eafb1301c7143a5.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ab0351109b34f4003eafb1301c7143a5.exe
Resource
win10v2004-20240226-en
General
-
Target
ab0351109b34f4003eafb1301c7143a5
-
Size
384KB
-
MD5
ab0351109b34f4003eafb1301c7143a5
-
SHA1
b6e36be7ad2692c83f66f1230da3584b0c3dcc68
-
SHA256
871a50a29f80a63b7f89ed45e8bf32b9c2e2c04eede12eb8ca59986078b4a921
-
SHA512
4468aa3cc15bf405a6b0d09a01bf78af54e2bc3d34d0e442412225c1ded5f1d2df887a93bffe6bc8db7782db7e172b307047b7a0f4d8b4401aec9c76ab05ca06
-
SSDEEP
6144:XEJwE89gM5g26yGFbV9qtdA+Gd8YmVoO0kDBrY+y7r9/A5qBRXI7mxREPfq6F8wF:ywsMz/GFjOHGdDbRklo7r9/Lb
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ab0351109b34f4003eafb1301c7143a5
Files
-
ab0351109b34f4003eafb1301c7143a5.exe windows:4 windows x86 arch:x86
2777826f4ba10189329c4a1245af79b4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualFreeEx
FindResourceExA
VirtualProtect
Sleep
GetProcAddress
SetLastError
CloseHandle
GetFileSize
CreateMutexA
ReadFile
CreateFileA
LocalAlloc
GlobalFree
WriteFile
GlobalAlloc
UnlockFile
LockFile
SetFilePointer
CreateEventA
SystemTimeToFileTime
GetSystemTime
FindClose
FindNextFileA
GetStringTypeA
LCMapStringW
LCMapStringA
FreeLibrary
GetOEMCP
GetACP
GetCPInfo
HeapReAlloc
HeapAlloc
RtlUnwind
HeapCreate
HeapDestroy
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetModuleFileNameA
GetStringTypeW
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
HeapFree
ExitProcess
GetVersion
GetCommandLineA
GetStartupInfoA
CreateSemaphoreA
LoadLibraryA
GetTempPathA
CopyFileA
VirtualAlloc
GetModuleHandleA
GetSystemDirectoryA
GetLastError
MultiByteToWideChar
VirtualFree
user32
RegisterClassExA
LoadCursorA
LoadIconA
UpdateWindow
ShowWindow
CreateWindowExA
GetIconInfo
GetMessageA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
LoadAcceleratorsA
GetDesktopWindow
IsWindow
GetDC
SetWindowRgn
CopyImage
DrawIcon
DestroyIcon
CreateIconIndirect
EndDialog
LoadStringA
DialogBoxParamA
DestroyWindow
DefWindowProcA
BeginPaint
GetClientRect
DrawTextA
EndPaint
PostQuitMessage
IsWindowVisible
gdi32
GetDIBits
EnumObjects
CreateDCA
CreatePen
CreateSolidBrush
SelectObject
Rectangle
DeleteObject
GetObjectA
ole32
CoInitialize
pdh
PdhCollectQueryData
PdhAddCounterA
PdhOpenQueryA
Sections
.text Size: 160KB - Virtual size: 158KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 572KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bosevl Size: 184KB - Virtual size: 184KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vvls Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.msl Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ