f:\seaauk\qayemh\tgqjuaa\sste\kkepz
Static task
static1
Behavioral task
behavioral1
Sample
ac2e0c7485b335bb890744fe89efeef5.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ac2e0c7485b335bb890744fe89efeef5.exe
Resource
win10v2004-20240226-en
General
-
Target
ac2e0c7485b335bb890744fe89efeef5
-
Size
584KB
-
MD5
ac2e0c7485b335bb890744fe89efeef5
-
SHA1
f794e16acc8313d134d2ea6456d8f6dd0a4953d7
-
SHA256
07e6563948977034e036f88348e885b6cc7591bcc2de98c4cca0d7d94b414a93
-
SHA512
c8b47faf36c830bc8a8f0b3a0d3b60ceb995dbb774553dd964b79d5f755248f0ad1190f1b860464ef501bcacbf335f4aa1e1c39e303e7960a012b02beae2bf3d
-
SSDEEP
12288:oguW3hsS5NYuN2nfSzQ+5+pP4YziBnLzstyiFTUHCTSDU1:QmNYS2nfSzQ+MZ4uyUHFTUcSDU1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ac2e0c7485b335bb890744fe89efeef5
Files
-
ac2e0c7485b335bb890744fe89efeef5.exe windows:4 windows x86 arch:x86
f1014c0b31a16961c0b743955c792517
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
GetCurrentDirectoryW
GetTimeZoneInformation
GetFileType
OpenMutexA
GetCommandLineA
LCMapStringA
HeapReAlloc
GetStringTypeA
TlsFree
GetEnvironmentStrings
WriteFile
ExitProcess
GetFileAttributesW
FreeEnvironmentStringsA
InterlockedIncrement
GetCurrentProcess
HeapDestroy
GetCommandLineW
LCMapStringW
SetFilePointer
CompareStringW
TlsSetValue
EnterCriticalSection
InterlockedExchange
GetStartupInfoW
GetProcAddress
HeapFree
GetLastError
MultiByteToWideChar
CreateMutexA
TerminateProcess
HeapCreate
GetCurrentProcessId
FlushFileBuffers
VirtualFree
UnhandledExceptionFilter
HeapAlloc
GetModuleFileNameA
LeaveCriticalSection
GetVersion
GetStdHandle
SetEnvironmentVariableA
GetModuleHandleA
TlsAlloc
GetEnvironmentStringsW
GetStartupInfoA
GetModuleFileNameW
SetLastError
GetStringTypeW
CloseHandle
GetCurrentThreadId
VirtualQuery
VirtualAlloc
GetCPInfo
GetDiskFreeSpaceExA
WideCharToMultiByte
SetHandleCount
IsBadWritePtr
InterlockedDecrement
TlsGetValue
GetCurrentThread
GetTickCount
RtlUnwind
WaitForSingleObject
GetSystemTime
QueryPerformanceCounter
LoadLibraryA
SetStdHandle
FreeEnvironmentStringsW
GetTempPathA
InitializeCriticalSection
DeleteCriticalSection
GetSystemTimeAsFileTime
GetLocalTime
ReadFile
CompareStringA
user32
CharLowerBuffW
GetClassInfoA
ValidateRgn
GetKeyState
EqualRect
LoadStringA
SubtractRect
SetWindowRgn
DestroyMenu
CreateIconFromResource
EmptyClipboard
GetUpdateRect
IsWindow
UnionRect
DrawTextA
DefWindowProcW
IsChild
DlgDirSelectExW
VkKeyScanW
AttachThreadInput
ShowWindow
GetKeyboardLayoutNameW
MonitorFromWindow
ReuseDDElParam
CreateAcceleratorTableW
OpenWindowStationA
GetForegroundWindow
KillTimer
CountClipboardFormats
RegisterClassExA
IsDialogMessage
RegisterClassA
FlashWindowEx
LoadStringW
GetSystemMetrics
GetScrollRange
ScrollWindow
ChildWindowFromPoint
DdeInitializeA
CreatePopupMenu
GetDoubleClickTime
GetClassLongA
LoadAcceleratorsA
GetClassNameA
CreateWindowExW
GetInputDesktop
OpenClipboard
EnumPropsExA
DdeCmpStringHandles
MessageBoxW
GetDlgItem
DestroyWindow
SetThreadDesktop
DlgDirListA
SetForegroundWindow
ShowWindowAsync
GetWindowTextW
WindowFromPoint
AdjustWindowRect
TrackMouseEvent
IsDlgButtonChecked
FindWindowW
comctl32
CreateUpDownControl
ImageList_GetImageCount
ImageList_GetImageInfo
ImageList_DrawEx
ImageList_EndDrag
_TrackMouseEvent
DrawInsert
ImageList_LoadImageA
ImageList_Create
ImageList_LoadImageW
ImageList_GetBkColor
ImageList_SetOverlayImage
ImageList_ReplaceIcon
ImageList_SetFlags
DestroyPropertySheetPage
CreatePropertySheetPage
CreateStatusWindowW
ImageList_Destroy
InitCommonControlsEx
ImageList_DragMove
ImageList_GetDragImage
comdlg32
GetFileTitleA
Sections
.text Size: 164KB - Virtual size: 162KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256KB - Virtual size: 253KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 104KB - Virtual size: 116KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 56KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ