Static task
static1
Behavioral task
behavioral1
Sample
ab14f6d55ddcbfeb779f720aacdca3ad.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ab14f6d55ddcbfeb779f720aacdca3ad.exe
Resource
win10v2004-20240226-en
General
-
Target
ab14f6d55ddcbfeb779f720aacdca3ad
-
Size
140KB
-
MD5
ab14f6d55ddcbfeb779f720aacdca3ad
-
SHA1
8600de66bba125f9f10c244c50dfaf8df5a0bd08
-
SHA256
eaeed428d6e94dcab7e837dc217ea4fcd5c3c4642266c34deb53314aaaa5bb89
-
SHA512
24df4eb86e3e85b732e21ebe630d5f38f9c47f54fdd7cd378df52b68ae5cc39618a667b1ddad893416cd88b2e7e5394d28925634e2871d71719db4a754f5a296
-
SSDEEP
1536:ajUejdYlNo0mPs+oWTQgBbsVrXfH+aJr5Zqh/hyIRoXjfc2tivKCl3CYmQ7uvAFj:93G5ccbULtcLRzkivJPm3vAFYqct2V
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ab14f6d55ddcbfeb779f720aacdca3ad
Files
-
ab14f6d55ddcbfeb779f720aacdca3ad.exe windows:4 windows x86 arch:x86
83a54810a7a5547b0ea4e5d758f3ee32
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
Sleep
CreateFileW
GetFileSize
GetTempFileNameW
WideCharToMultiByte
GetModuleFileNameW
OpenEventW
DeleteFileW
CreateProcessW
CloseHandle
GetLastError
LoadLibraryW
GetTempPathW
GetProcAddress
CreateFileA
SetEndOfFile
LCMapStringW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
DuplicateHandle
HeapFree
GetVersionExA
HeapAlloc
GetProcessHeap
GetStartupInfoW
RaiseException
RtlUnwind
GetModuleHandleA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
MultiByteToWideChar
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetFileAttributesW
ExitProcess
CreatePipe
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
WriteFile
GetConsoleCP
GetConsoleMode
GetModuleFileNameA
GetCommandLineA
GetCommandLineW
HeapDestroy
HeapCreate
VirtualFree
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
VirtualAlloc
HeapReAlloc
HeapSize
SetFilePointer
ReadFile
InitializeCriticalSection
LoadLibraryA
SetStdHandle
FlushFileBuffers
CompareStringA
CompareStringW
SetEnvironmentVariableA
SetEnvironmentVariableW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
LCMapStringA
advapi32
RegSetValueExW
RegCloseKey
RegQueryValueExW
RegOpenKeyExW
ole32
CoCreateInstance
CoInitializeEx
CoUninitialize
Sections
.text Size: 96KB - Virtual size: 94KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 176B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ