Static task
static1
Behavioral task
behavioral1
Sample
abd5442c31e695fbaf306bf034580937.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
abd5442c31e695fbaf306bf034580937.exe
Resource
win10v2004-20240226-en
General
-
Target
abd5442c31e695fbaf306bf034580937
-
Size
145KB
-
MD5
abd5442c31e695fbaf306bf034580937
-
SHA1
6f0cae81a73455aed5be7ce0f33e4a3b442607ec
-
SHA256
e39b9d5b782655110cca591d3ea6cc304c6370b9c60a21a8ac29894af8c9cdcd
-
SHA512
b3277ce0a22ad1b5058498ba99cdd23aef76d14420e698ad7bde3649f04cff578c1ed46a338cb52a54f1e214d4f21d18026444a62d80e7359e23dcc0f37d3128
-
SSDEEP
3072:ponlHd5QaipSpgviM3DFubvMl0ygVg+TzKQQvotg9dZy:ponlHd5Qa2vH3ko0ygVgMzlQY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource abd5442c31e695fbaf306bf034580937
Files
-
abd5442c31e695fbaf306bf034580937.exe windows:4 windows x86 arch:x86
21a7231994e400b14fc4da95deb29edd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comdlg32
GetOpenFileNameA
comctl32
ord17
shell32
SHGetPathFromIDListA
SHBrowseForFolderA
SHGetSpecialFolderLocation
kernel32
GetEnvironmentStringsW
lstrcpyA
lstrlenA
GetModuleFileNameA
GetModuleHandleA
lstrcpynA
WriteFile
lstrcatA
GetTempPathA
CloseHandle
ReadFile
GetFileSize
CreateFileA
LeaveCriticalSection
EnterCriticalSection
GetCurrentThreadId
FlushInstructionCache
GetCurrentProcess
lstrcmpA
DeleteFileA
SetFilePointer
SetFileTime
SetCurrentDirectoryA
CreateDirectoryA
SetFileAttributesA
GetFileAttributesA
InterlockedDecrement
InitializeCriticalSection
CompareStringA
SetEndOfFile
GetStringTypeW
GetStringTypeA
LoadLibraryA
InterlockedIncrement
SetStdHandle
LCMapStringW
LCMapStringA
MultiByteToWideChar
GetOEMCP
GetACP
GetCPInfo
IsBadCodePtr
IsBadReadPtr
SetUnhandledExceptionFilter
FlushFileBuffers
GetFileType
GetStdHandle
SetHandleCount
DeleteCriticalSection
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
TerminateProcess
GetProcAddress
GetFullPathNameA
WideCharToMultiByte
FileTimeToLocalFileTime
CompareStringW
GetStartupInfoA
FindFirstFileA
IsBadWritePtr
HeapReAlloc
RtlUnwind
GetLastError
SetEnvironmentVariableA
GetCurrentDirectoryA
HeapFree
HeapAlloc
GetTimeZoneInformation
GetSystemTime
GetLocalTime
FindClose
FileTimeToSystemTime
VirtualAlloc
GetDriveTypeA
VirtualFree
SetLastError
GetCommandLineA
GetVersion
ExitProcess
TlsSetValue
TlsAlloc
TlsGetValue
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
user32
ShowWindow
PeekMessageA
IsDialogMessageA
TranslateMessage
DispatchMessageA
SendMessageA
CreateDialogParamA
CheckDlgButton
GetWindowTextA
wsprintfA
IsDlgButtonChecked
LoadCursorA
SetCursor
GetDesktopWindow
SetFocus
DestroyWindow
PostMessageA
GetActiveWindow
DialogBoxParamA
EnableWindow
LoadStringA
MessageBoxA
SetWindowLongA
EndDialog
GetSystemMetrics
GetWindowRect
MoveWindow
GetDlgItem
SetWindowTextA
advapi32
GetSecurityDescriptorControl
ole32
CoRegisterClassObject
CoInitialize
CoUninitialize
CoRevokeClassObject
Sections
.text Size: 88KB - Virtual size: 87KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ