winword.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ab3ae5339369eb2751fd309770968056.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ab3ae5339369eb2751fd309770968056.exe
Resource
win10v2004-20240226-en
General
-
Target
ab3ae5339369eb2751fd309770968056
-
Size
154KB
-
MD5
ab3ae5339369eb2751fd309770968056
-
SHA1
fb2c125cb25a60bb5623552f4c64ebd197ffacdd
-
SHA256
e2bbca6a4b0cf8e575ef63dd5a0fa193e23c91d5d672ec6087e54404e8d11f8f
-
SHA512
1bc2dddd1904795c1670ff38c511294b27973017420452a40efd90378c020d0414971fe69996d279fa7f981722d67af85e94c200a200b990e356a029ddb19b8a
-
SSDEEP
3072:wvD2etHXfywWNzBfnv75XIYwESYXcQYDEWJNVkM:wZnGfnv9XIYqcY5Nd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ab3ae5339369eb2751fd309770968056
Files
-
ab3ae5339369eb2751fd309770968056.exe windows:4 windows x86 arch:x86
cbf47572e8cb446c01bd5522c7d7f827
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
ExitProcess
FormatMessageA
GetLastError
SetLastError
VirtualAlloc
CloseHandle
MapViewOfFile
CreateFileMappingA
VirtualFree
GetProcAddress
VirtualProtect
LoadLibraryA
GetModuleHandleA
GetModuleFileNameW
UnmapViewOfFile
lstrcpynW
GetFullPathNameW
SetEnvironmentVariableW
HeapAlloc
GetProcessHeap
GetFileSize
ReadFile
SetFilePointer
CreateFileW
WideCharToMultiByte
GetEnvironmentVariableW
GetVersion
user32
MessageBoxA
Exports
Exports
DllGetLCID
wdCommandDispatch
wdGetApplicationObject
Sections
.text Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.res Size: 145KB - Virtual size: 148KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 136B - Virtual size: 11.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE