Static task
static1
Behavioral task
behavioral1
Sample
fab565db7109a7d8101d1e118fe9eaf568533b8d7f26551d2b20957c6c907ad4.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
fab565db7109a7d8101d1e118fe9eaf568533b8d7f26551d2b20957c6c907ad4.exe
Resource
win10v2004-20240226-en
General
-
Target
fab565db7109a7d8101d1e118fe9eaf568533b8d7f26551d2b20957c6c907ad4
-
Size
473KB
-
MD5
6aee68123cb548e8d4495c073f7478a5
-
SHA1
0eb281627bd33a66b748ffe9a77805e0a3892dfb
-
SHA256
fab565db7109a7d8101d1e118fe9eaf568533b8d7f26551d2b20957c6c907ad4
-
SHA512
202af108157a7156007560d6cb6d99f6d395062763d6b395702d3165439710eeef1936bde8cb1cad3206ab89ba68d42b4f31c869780f012e55a901691ac8b869
-
SSDEEP
12288:oVWW/Dcqa1qX6PDJFfsVsWo7/8Td0LGD6oMff:+DfakX6PDJFfNXUTdRy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fab565db7109a7d8101d1e118fe9eaf568533b8d7f26551d2b20957c6c907ad4
Files
-
fab565db7109a7d8101d1e118fe9eaf568533b8d7f26551d2b20957c6c907ad4.exe windows:4 windows x64 arch:x64
4d3285d6d9dd384060bcab600bde98a1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
WritePrivateProfileStringA
GetCurrentDirectoryA
GlobalFlags
GlobalAddAtomA
lstrcmpW
GlobalFindAtomA
GetCPInfo
GetOEMCP
HeapReAlloc
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
GetDateFormatA
GetTimeFormatA
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
RtlCaptureContext
GetProcessHeap
RtlLookupFunctionEntry
RtlUnwindEx
RaiseException
RtlPcToFileHeader
ExitProcess
SetStdHandle
GetFileType
RtlVirtualUnwind
HeapSetInformation
HeapCreate
GetStdHandle
GetACP
IsValidCodePage
FlsGetValue
FlsSetValue
FlsFree
FlsAlloc
LCMapStringW
GetStringTypeA
GetStringTypeW
GetTimeZoneInformation
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetStartupInfoA
QueryPerformanceCounter
GetConsoleCP
GetConsoleMode
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
GlobalHandle
GlobalReAlloc
TlsAlloc
InitializeCriticalSection
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
GetModuleFileNameW
GlobalGetAtomNameA
FindNextFileA
GetFileTime
GetFileAttributesA
FileTimeToLocalFileTime
GetFullPathNameA
DuplicateHandle
GetFileSize
UnlockFile
LockFile
FlushFileBuffers
LoadLibraryA
GetThreadLocale
SetErrorMode
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
FindActCtxSectionStringA
LoadLibraryExA
lstrcmpA
FreeLibrary
SetLastError
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
FormatMessageA
GetVersionExA
LCMapStringA
FileTimeToSystemTime
GetDriveTypeA
GetProcAddress
GetVolumeInformationA
CreateDirectoryA
OpenProcess
GetCurrentProcessId
Process32Next
Process32First
CreateToolhelp32Snapshot
TerminateProcess
CreateProcessA
WaitForSingleObject
Sleep
GetCurrentProcess
GetModuleHandleA
GetCommandLineA
MoveFileA
GetModuleFileNameA
GetTickCount
LocalFree
LocalAlloc
GetSystemWindowsDirectoryA
LoadResource
ReadFile
LockResource
SizeofResource
SetEndOfFile
CloseHandle
WriteFile
SetFilePointer
CreateFileA
FindClose
FindFirstFileA
FindResourceA
lstrlenA
CompareStringA
GetLastError
MultiByteToWideChar
CompareStringW
WideCharToMultiByte
HeapSize
GetVersion
user32
RegisterWindowMessageA
LoadIconA
WinHelpA
GetCapture
GetClassLongA
GetClassLongPtrA
SetPropA
GetPropA
RemovePropA
IsWindow
GetForegroundWindow
GetDlgItem
GetTopWindow
DestroyWindow
GetWindowLongPtrA
SetWindowLongPtrA
GetMessageTime
GetMessagePos
MapWindowPoints
ShowWindow
SetForegroundWindow
GetClientRect
GetMenu
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
CopyRect
AdjustWindowRectEx
DefWindowProcA
CallWindowProcA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindow
GetDlgCtrlID
GetWindowRect
GetClassNameA
PtInRect
SetWindowTextA
ClientToScreen
UnregisterClassA
DestroyMenu
CharUpperA
SendMessageTimeoutW
GetSubMenu
GetMenuItemCount
GetMenuItemID
GetMenuState
PostQuitMessage
PostMessageA
MessageBoxA
EnableWindow
IsWindowEnabled
GetLastActivePopup
GetParent
GetWindowLongA
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
SetCursor
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
ModifyMenuA
EnableMenuItem
CheckMenuItem
SetWindowsHookExA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
IsWindowVisible
GetKeyState
PeekMessageA
GetCursorPos
ValidateRect
UnhookWindowsHookEx
LoadCursorA
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
GetWindowTextA
GetSystemMetrics
GetWindowThreadProcessId
SendMessageA
gdi32
GetStockObject
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
RectVisible
PtVisible
GetDeviceCaps
CreateBitmap
SaveDC
RestoreDC
SetBkColor
SetTextColor
SetMapMode
GetClipBox
DeleteObject
DeleteDC
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegQueryValueA
RegEnumKeyA
RegQueryValueExA
OpenServiceA
RegOpenKeyA
CloseServiceHandle
OpenSCManagerA
QueryServiceStatus
RegQueryValueExW
RegOpenKeyExW
RegDeleteKeyA
RegSetValueExW
RegOpenKeyExA
RegCloseKey
CreateWellKnownSid
ConvertSidToStringSidA
AdjustTokenPrivileges
LookupAccountSidA
LookupAccountNameA
RegisterEventSourceA
ReportEventA
DeregisterEventSource
RegCreateKeyExA
RegSetValueExA
OpenProcessToken
LookupPrivilegeValueA
shlwapi
PathFindFileNameA
PathFindExtensionA
PathStripToRootA
PathIsUNCA
ole32
CoInitializeEx
oleaut32
VariantClear
SafeArrayCreateVector
SafeArrayPutElement
SafeArrayDestroy
VariantChangeType
SysFreeString
SysAllocStringLen
VariantInit
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayGetUBound
SafeArrayGetLBound
netapi32
NetApiBufferFree
NetLocalGroupGetMembers
activeds
ord3
ord5
ord6
ord4
Sections
.text Size: 295KB - Virtual size: 295KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 145KB - Virtual size: 144KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ