Static task
static1
Behavioral task
behavioral1
Sample
abb53fd8643615b89685e67c0ec7c5d0N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
abb53fd8643615b89685e67c0ec7c5d0N.exe
Resource
win10v2004-20240709-en
General
-
Target
abb53fd8643615b89685e67c0ec7c5d0N.exe
-
Size
128KB
-
MD5
abb53fd8643615b89685e67c0ec7c5d0
-
SHA1
1690cb216fb3a8d98a8c849b1a90c660b8ab3bad
-
SHA256
d86d67d52c12757ce19dc0a17eac39f850f310f4c5ab87d0be40a05e51180f17
-
SHA512
ea804a3c23760d2293e2e588063812277dffd0807d39031442d1d9142d792c77a749d861e209e703597d93c1d009d8f6608037b74430373fb38346489f8ac987
-
SSDEEP
768:J3PqCF70lTA5jcqicMj8JyPcFZVz5F1S:J/qo0lSc4mzun1F1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource abb53fd8643615b89685e67c0ec7c5d0N.exe
Files
-
abb53fd8643615b89685e67c0ec7c5d0N.exe.exe windows:4 windows x86 arch:x86
7a8c1d95181927fc3c65379af279ec9f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetSystemDefaultLangID
GetStringTypeA
LCMapStringW
GetCommandLineA
GetVersion
ExitProcess
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
GetModuleFileNameA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
GetModuleHandleA
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
HeapFree
RtlUnwind
WriteFile
HeapAlloc
GetCPInfo
GetACP
GetOEMCP
VirtualAlloc
HeapReAlloc
GetProcAddress
LoadLibraryA
MultiByteToWideChar
LCMapStringA
GetStringTypeW
user32
MessageBoxW
Sections
.text Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 104KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE