Static task
static1
Behavioral task
behavioral1
Sample
acb80c4d06a849dd145576ca5aae80b4.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
acb80c4d06a849dd145576ca5aae80b4.exe
Resource
win10v2004-20240226-en
General
-
Target
acb80c4d06a849dd145576ca5aae80b4
-
Size
415KB
-
MD5
acb80c4d06a849dd145576ca5aae80b4
-
SHA1
a69e82ab5c91efafd7350ef62c3006af3614fa9a
-
SHA256
149db75ff2ceb32d940fa92a61e6aa0cea49a09c1f840a9db733eda17f7d4d99
-
SHA512
2f7936afaeb4fcc1e8c3b8c3a8dec9045a730a866fc795d6bbae2a8203436bc9acc2fcb464293d6fc047540beb0349eb7fd08024477360d53febbe2c7cb14c81
-
SSDEEP
12288:Y5CRtSBNtwI2RCcn9bSIbZFYBGVija7ERmj:aQtSfpwhn9mtGViC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource acb80c4d06a849dd145576ca5aae80b4
Files
-
acb80c4d06a849dd145576ca5aae80b4.exe windows:4 windows x86 arch:x86
33af5682c2675d8cd1600d2686995953
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegEnumKeyExA
ReportEventW
shell32
ExtractIconExW
SHChangeNotify
SHGetNewLinkInfo
SHGetSpecialFolderLocation
SHGetDiskFreeSpaceA
SheGetDirA
ShellExecuteExW
FindExecutableW
SHGetMalloc
SHGetPathFromIDListW
DragQueryFileW
SHGetSettings
CommandLineToArgvW
SHBrowseForFolderW
RealShellExecuteA
SHFreeNameMappings
SHFormatDrive
SHGetPathFromIDListA
SHGetInstanceExplorer
SHGetPathFromIDList
InternalExtractIconListW
ExtractIconExA
SHBrowseForFolderA
ShellAboutW
gdi32
SetPixel
GetTextColor
GetDeviceCaps
CreateDIBPatternBrush
CreateMetaFileW
ExtSelectClipRgn
ColorCorrectPalette
CreateCompatibleDC
CreatePolyPolygonRgn
PolylineTo
SetDIBits
Polyline
AnimatePalette
gdiPlaySpoolStream
GetStockObject
ResizePalette
GetColorAdjustment
GetObjectA
SetColorSpace
FillPath
ResetDCA
user32
TabbedTextOutA
ShowWindow
BeginPaint
GetCaretBlinkTime
CallMsgFilterW
kernel32
GetLocaleInfoA
EnterCriticalSection
SetLastError
VirtualAlloc
GetTimeFormatA
InterlockedExchange
Sleep
GetModuleFileNameA
GetCurrentThreadId
CreateEventW
FreeEnvironmentStringsW
GetStringTypeA
GetProcAddress
SetHandleCount
VirtualFree
GetShortPathNameW
UnhandledExceptionFilter
GetDateFormatA
HeapSize
TlsGetValue
GetStdHandle
GetTimeZoneInformation
HeapAlloc
GetLongPathNameW
lstrcpyn
GetStartupInfoW
InterlockedIncrement
TlsSetValue
WriteFile
WideCharToMultiByte
HeapCreate
CompareStringA
DeleteCriticalSection
IsValidCodePage
HeapReAlloc
GetStartupInfoA
GetOEMCP
GetUserDefaultLCID
GetCommandLineW
GetCurrentProcessId
IsValidLocale
InterlockedDecrement
GetLastError
TlsFree
GetSystemTimeAsFileTime
GetFileType
HeapDestroy
HeapFree
GetTickCount
GetEnvironmentStringsW
GetCurrentThread
FreeEnvironmentStringsA
GetLocaleInfoW
LocalUnlock
ExitProcess
GetACP
InitializeCriticalSection
SetUnhandledExceptionFilter
EnumSystemLocalesA
SetConsoleCtrlHandler
QueryPerformanceCounter
MultiByteToWideChar
IsDebuggerPresent
CompareStringW
GetEnvironmentStrings
LCMapStringA
LoadLibraryA
TlsAlloc
GetModuleHandleA
GetCPInfo
RtlUnwind
TerminateProcess
GetStringTypeW
VirtualQuery
GetVersionExA
GetProcessHeap
GetCurrentProcess
LeaveCriticalSection
SetEnvironmentVariableA
GetModuleFileNameW
FreeLibrary
LCMapStringW
GetCommandLineA
comdlg32
GetFileTitleW
GetSaveFileNameW
ChooseFontA
GetOpenFileNameW
ReplaceTextW
ChooseFontW
GetFileTitleA
ReplaceTextA
PrintDlgW
GetOpenFileNameA
Sections
.text Size: 130KB - Virtual size: 130KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 274KB - Virtual size: 298KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ