Static task
static1
Behavioral task
behavioral1
Sample
0ab8594bbbbec57158058b7de3359740N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
0ab8594bbbbec57158058b7de3359740N.exe
Resource
win10v2004-20240802-en
General
-
Target
0ab8594bbbbec57158058b7de3359740N
-
Size
196KB
-
MD5
0ab8594bbbbec57158058b7de3359740
-
SHA1
530ae71fff90ae1383b18470756ddd1e7ec1ff10
-
SHA256
35ffc8207d32d813d8c03991283107d156edfb59d77a85cfcc4d6f8c4bd67252
-
SHA512
4f6e62a513c693a729f1b712c92ce6fa05ad07f24ae5b8d2178b6ab000db9eebbf8fbeb4674fb6f144ee544ed944dc235fd2185b362455c5cba083703a26f5ab
-
SSDEEP
6144:Dc6BtUaNMtLLowRg4uLhuMXUk4m5xnt0Vu:DjuaWLJgzLMkvou
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0ab8594bbbbec57158058b7de3359740N
Files
-
0ab8594bbbbec57158058b7de3359740N.exe windows:4 windows x86 arch:x86
fc5c1aac18a83503e3cae0c72797cbed
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCalendarInfoW
GetEnvironmentStringsW
GetTimeFormatA
DuplicateHandle
GetFileType
GetTempFileNameW
CreateFileA
CompareStringW
IsBadReadPtr
OpenProcess
SetThreadPriority
lstrcat
GetModuleHandleA
SearchPathW
RemoveDirectoryW
GlobalFindAtomA
FileTimeToSystemTime
lstrcpynA
OpenSemaphoreA
lstrcatA
IsBadStringPtrA
SetComputerNameW
CompareFileTime
FindResourceA
CopyFileExW
SetLocaleInfoA
GetVersionExA
GetTempFileNameA
GetStartupInfoW
ExitThread
SetErrorMode
SearchPathA
lstrcpyW
InitializeCriticalSection
GetLocaleInfoW
GetCurrentProcess
GetCommandLineW
GlobalFindAtomW
GlobalGetAtomNameA
GetFileSize
GlobalAlloc
GetProcAddress
CreateSemaphoreW
GlobalGetAtomNameW
GetSystemDirectoryW
GetPriorityClass
CreateMutexA
FreeResource
GetUserDefaultLCID
user32
LoadBitmapW
EnumWindows
GetKeyboardLayout
GetWindowTextA
EmptyClipboard
CreateDialogParamW
GetClassNameW
GetIconInfo
CharLowerW
DrawTextW
GetMenuItemInfoA
GetWindowTextLengthW
SetCursor
CharNextW
GetMenuState
GetKeyState
CheckMenuRadioItem
WaitForInputIdle
InsertMenuW
ChildWindowFromPoint
DialogBoxParamA
SetWindowTextA
mouse_event
GetClassInfoExW
CreateWindowExW
GetMenuStringA
GetCaretPos
DestroyMenu
CheckRadioButton
EnumDesktopsA
GetDC
CreateMenu
GetMenuItemID
keybd_event
FlashWindow
CallWindowProcA
MessageBeep
DestroyCursor
CopyRect
FindWindowW
SetCapture
CreateCaret
EnumDesktopsW
FindWindowA
GetMessageW
GetClassInfoW
gdi32
SetEnhMetaFileBits
RemoveFontResourceExW
CreateEllipticRgn
CreateDIBSection
GetMiterLimit
EnumFontFamiliesW
GetRasterizerCaps
GetBitmapDimensionEx
GetMetaFileBitsEx
advapi32
RegOpenKeyExA
RegCreateKeyW
RegQueryValueA
RegQueryInfoKeyW
RegCreateKeyExW
shlwapi
StrCatBuffA
SHRegCreateUSKeyW
IntlStrEqWorkerW
DllGetVersion
oleaut32
VarR8FromR4
VariantCopy
VarPow
VarI2FromI1
VarUI2FromR8
VarBoolFromStr
OaBuildVersion
setupapi
CM_Dup_Range_List
SetupGetFileQueueFlags
SetupQueueRenameSectionA
Sections
.text Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.JQKFDY Size: 2KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.lbHO Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.Omwwn Size: 3KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.Hu Size: 512B - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.f Size: 1KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.Ft Size: 1KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.p Size: 512B - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.Vje Size: 512B - Virtual size: 201KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 164KB - Virtual size: 164KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 1018B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ