Static task
static1
Behavioral task
behavioral1
Sample
abcb88c6a4356e5a6136f3f4c2a00b88fc407d717bf4b5bfcb7955ba7f574daa.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
abcb88c6a4356e5a6136f3f4c2a00b88fc407d717bf4b5bfcb7955ba7f574daa.exe
Resource
win10v2004-20240508-en
General
-
Target
abcb88c6a4356e5a6136f3f4c2a00b88fc407d717bf4b5bfcb7955ba7f574daa
-
Size
13.0MB
-
MD5
bf56d5b9218dd7de57915d7139af3326
-
SHA1
88c41877eabfe5bc6380c05295aa91b3677d253d
-
SHA256
abcb88c6a4356e5a6136f3f4c2a00b88fc407d717bf4b5bfcb7955ba7f574daa
-
SHA512
3122e0f278fcdb560160bbbfdb4e98307bcfe3870cea232ccf6d39cc22df6046cee0ce789c72c80d29f71016bc783608ab9a0aa3059ac8a3b282049d2478b919
-
SSDEEP
393216:81B4fRf/iMZ+BSFWC0UlptgWXFwwyucDc:81KnwOX0UlfwwyucD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource abcb88c6a4356e5a6136f3f4c2a00b88fc407d717bf4b5bfcb7955ba7f574daa
Files
-
abcb88c6a4356e5a6136f3f4c2a00b88fc407d717bf4b5bfcb7955ba7f574daa.exe windows:5 windows x86 arch:x86
b04e69eaa3b09e1bc37a8e167d4e3c45
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
rasapi32
RasHangUpA
winmm
midiStreamClose
ws2_32
socket
kernel32
GetVersion
GetVersionExA
GetSystemTimeAsFileTime
LocalAlloc
LocalFree
GetModuleFileNameW
ExitProcess
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
ScrollWindowEx
CharUpperBuffW
gdi32
CombineRgn
winspool.drv
OpenPrinterA
comdlg32
ChooseColorA
advapi32
RegOpenKeyA
shell32
ShellExecuteA
ole32
CLSIDFromProgID
oleaut32
SafeArrayCreate
comctl32
ImageList_Destroy
wininet
InternetCanonicalizeUrlA
Sections
T-VMP Size: - Virtual size: 1.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
T-VMP Size: - Virtual size: 9.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
T-VMP Size: - Virtual size: 589KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
T-VMP Size: - Virtual size: 7.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
T-VMP Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
T-VMP Size: 10.7MB - Virtual size: 10.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
T-VMP Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
T-VMP Size: 1.7MB - Virtual size: 1.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
T-VMP Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
T-VMP Size: 548KB - Virtual size: 547KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
T-VMP Size: 24KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ