Static task
static1
Behavioral task
behavioral1
Sample
dab1e94301b0044bd222611ca3a163653e2c10c76477ed5b176bedfdc242e305.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
dab1e94301b0044bd222611ca3a163653e2c10c76477ed5b176bedfdc242e305.exe
Resource
win10v2004-20240419-en
General
-
Target
dab1e94301b0044bd222611ca3a163653e2c10c76477ed5b176bedfdc242e305
-
Size
607KB
-
MD5
7951c31f3311ecad0f3c9f535c02ec67
-
SHA1
7871ad03a9767fd4d6d8815a54f9fe9fd687c88f
-
SHA256
dab1e94301b0044bd222611ca3a163653e2c10c76477ed5b176bedfdc242e305
-
SHA512
8bfa4fc6004dfc39e49815348f1fbc3b059c71c479b90b3db8d99227f1f19d27f0a8232c60d1e9c4956cdafec4a8e9dc63670f676d1366ce025269a8af483d47
-
SSDEEP
6144:NptVO7mOV1u9MV0ue9Ya47I9Ya4oXtamAV3vQnx04EFtUXMamoa9tG6tP/q8f/Pe:NhEDfP/q8fmRYCKREDAu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource dab1e94301b0044bd222611ca3a163653e2c10c76477ed5b176bedfdc242e305
Files
-
dab1e94301b0044bd222611ca3a163653e2c10c76477ed5b176bedfdc242e305.exe windows:4 windows x86 arch:x86
adebbb86b5e51804d4a099487dedb258
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ExitProcess
HeapAlloc
IsBadReadPtr
CreateDirectoryW
GlobalUnlock
GlobalLock
GetModuleHandleA
user32
GetMessageA
CreateMenu
GetSystemMenu
GetClipboardOwner
FindWindowA
MessageBoxIndirectA
WinHelpA
InvalidateRect
SetWindowPos
GetClientRect
BeginPaint
SetWindowTextA
MsgWaitForMultipleObjects
IsWindow
CreateCaret
ShowCaret
HideCaret
DestroyCaret
EnableMenuItem
GetCursorPos
TrackPopupMenu
GetScrollInfo
ScreenToClient
GetKeyboardLayout
SetKeyboardState
ToUnicodeEx
ToAsciiEx
SetScrollInfo
GetMessageTime
PostMessageA
CheckMenuItem
FlashWindow
SetCaretPos
GetKeyboardState
LoadIconA
RegisterClassA
Sections
.text Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 560KB - Virtual size: 560KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE