Static task
static1
Behavioral task
behavioral1
Sample
abb42505862fca0dc838eba1671731fb3ec809e8cdbe989299860c541c0715d0.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
abb42505862fca0dc838eba1671731fb3ec809e8cdbe989299860c541c0715d0.exe
Resource
win10v2004-20240319-en
General
-
Target
abb42505862fca0dc838eba1671731fb3ec809e8cdbe989299860c541c0715d0
-
Size
140KB
-
MD5
f4e5775a481f385aaef5350e4289b706
-
SHA1
d15a876d5f1c9d3e7f3e8938355ffb3b93ecc607
-
SHA256
abb42505862fca0dc838eba1671731fb3ec809e8cdbe989299860c541c0715d0
-
SHA512
630861eb2069df1506e705be417bcdd33bfd1089abb608a236f6000db6240813a599e31ddcacd3a63f8c09ab156000f725b95d864e0408595d74313151fc43a8
-
SSDEEP
768:WFrHg9i1yc+2cdZKyl6kLmFgWpmm2nvyweCnO3Kk:GHei15+2eYPJgWfwe/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource abb42505862fca0dc838eba1671731fb3ec809e8cdbe989299860c541c0715d0
Files
-
abb42505862fca0dc838eba1671731fb3ec809e8cdbe989299860c541c0715d0.exe windows:4 windows x86 arch:x86
29069c47588f06aebc7cc902c047d87f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
essctl32
ord10
ord2
ord24
ord13
winmm
mixerGetDevCapsA
mixerClose
mixerSetControlDetails
mixerGetNumDevs
mixerOpen
mixerGetLineInfoA
mixerGetLineControlsA
mixerGetControlDetailsA
kernel32
lstrcpynA
GetCommandLineA
lstrcmpiA
GetPrivateProfileIntA
GlobalUnlock
GetVersion
GlobalAlloc
GetModuleFileNameA
LockResource
LoadResource
FindResourceA
LCMapStringA
LCMapStringW
GlobalLock
GlobalFree
lstrcpyA
HeapFree
GetStringTypeA
GetStringTypeW
GetProcAddress
HeapAlloc
VirtualAlloc
WritePrivateProfileStringA
LoadLibraryA
WinExec
GetPrivateProfileStringA
WriteFile
VirtualFree
HeapCreate
HeapDestroy
GetFileType
GetStdHandle
SetHandleCount
GetOEMCP
GetACP
GetCPInfo
WideCharToMultiByte
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
RtlUnwind
MultiByteToWideChar
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
ExitProcess
GetStartupInfoA
GetModuleHandleA
user32
GetWindowPlacement
InvalidateRect
SetClassLongA
DestroyWindow
IsIconic
GetWindowRect
DefWindowProcA
PostQuitMessage
RegisterClassA
LoadCursorA
UnregisterClassA
BringWindowToTop
GetLastActivePopup
UpdateWindow
MapWindowPoints
WinHelpA
LoadIconA
AppendMenuA
CheckMenuItem
LoadAcceleratorsA
GetMessageA
TranslateAcceleratorA
TranslateMessage
DispatchMessageA
SetWindowPos
GetWindowLongA
CallWindowProcA
GetKeyState
SetFocus
LoadStringA
GetFocus
MessageBoxA
BeginPaint
GetSystemMenu
EndPaint
PostMessageA
GetDC
ReleaseDC
SetWindowLongA
SendMessageA
EnableWindow
RegisterWindowMessageA
wsprintfA
FindWindowA
IsWindow
AdjustWindowRect
CreateWindowExA
GetSystemMetrics
MoveWindow
ShowWindow
SetWindowTextA
GetParent
GetSysColor
GetClientRect
gdi32
CreateSolidBrush
RealizePalette
CreateFontIndirectA
Rectangle
SelectObject
SelectPalette
UpdateColors
SetBkColor
GetStockObject
CreatePalette
GetDeviceCaps
SetDIBitsToDevice
DeleteObject
comctl32
ord17
Sections
.text Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1024B - Virtual size: 831B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 103KB - Virtual size: 102KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ