Static task
static1
Behavioral task
behavioral1
Sample
ab5d4325a4bc66c221512fd115ac857f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ab5d4325a4bc66c221512fd115ac857f.exe
Resource
win10v2004-20240226-en
General
-
Target
ab5d4325a4bc66c221512fd115ac857f
-
Size
84KB
-
MD5
ab5d4325a4bc66c221512fd115ac857f
-
SHA1
a43cf62c39849c045415db88d63d26a5247e399a
-
SHA256
e30cd8ba559fa736c91e8906e5582d8acce306e0cfdeacf0e6fcbac0d1eaf686
-
SHA512
23100aed8d7bc9dcf714da595044178af375c3283430a34c6f32665bf0b6910046e450588fec39f98d64f10b7104d37a2c9365f4be25a4647d7f200eaeac852a
-
SSDEEP
1536:ucT5IWsaGb/maZzUp3j1cQ9zBRAY8foJs:55IWsJ/maZzeT1ptSrfoJs
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ab5d4325a4bc66c221512fd115ac857f
Files
-
ab5d4325a4bc66c221512fd115ac857f.exe windows:4 windows x86 arch:x86
fa3f5739f6c86b6aaea16480b458a142
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVolumeInformationA
GetComputerNameA
TerminateProcess
OutputDebugStringA
GetLastError
CreateMutexA
DeleteFileA
FreeResource
LockResource
SizeofResource
LoadResource
FindResourceExA
OpenFile
WaitForSingleObject
CreateThread
GetModuleFileNameA
FindClose
FindNextFileA
FindFirstFileA
CompareStringW
CompareStringA
LCMapStringW
LCMapStringA
SetEndOfFile
LoadLibraryA
GetOEMCP
GetACP
GetCPInfo
GetStringTypeW
GetStringTypeA
MultiByteToWideChar
CreateProcessA
Sleep
GetLocalTime
lstrlenA
CreateFileA
FlushFileBuffers
SetStdHandle
SetFilePointer
RtlUnwind
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
SetEnvironmentVariableA
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetProcAddress
GetCurrentProcess
HeapFree
HeapAlloc
HeapReAlloc
GetTimeZoneInformation
GetSystemTime
GetFileAttributesA
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
CloseHandle
WriteFile
ReadFile
WideCharToMultiByte
user32
EnumChildWindows
GetWindowThreadProcessId
GetClassNameA
GetParent
CloseDesktop
SetForegroundWindow
EnumDesktopWindows
PostMessageA
CreateDesktopA
OpenDesktopA
SendMessageA
advapi32
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegSetValueExA
shell32
SHGetSpecialFolderPathA
ws2_32
WSAGetLastError
WSAStartup
connect
setsockopt
socket
htons
send
recv
closesocket
shutdown
gethostbyname
WSACleanup
inet_addr
Sections
.text Size: 60KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 172KB - Virtual size: 168KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ