Static task
static1
Behavioral task
behavioral1
Sample
abc8ad24a4848caf7d6976b915aa1ac0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
abc8ad24a4848caf7d6976b915aa1ac0N.exe
Resource
win10v2004-20240802-en
General
-
Target
abc8ad24a4848caf7d6976b915aa1ac0N
-
Size
780KB
-
MD5
abc8ad24a4848caf7d6976b915aa1ac0
-
SHA1
989fe365ac84aee8a2a9ad34a3eaabcb5016f136
-
SHA256
8b5d24255cf03c69e5818e05daf50262691289553836c93974631def73c8636a
-
SHA512
71b60ca83377a5d1b0a123c0e9d605c6a63c1dd5f03944f7f483ad16db3c9a81f3f3abd20c8d84c5eb471996f2e902d99b564469904c906925379a3e961072a4
-
SSDEEP
12288:m2slobDU3pRwx0DudXezE09Si/ckGHt6pshsPSGkYl2XIQCb+Lk1TWbPXQnAN5L:Xsh3zw+gXe4i7ojhsP5Lgrk1TWb4AN5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource abc8ad24a4848caf7d6976b915aa1ac0N
Files
-
abc8ad24a4848caf7d6976b915aa1ac0N.exe windows:5 windows x86 arch:x86
ff49fc5a9a7c8e3ae3ba4abbcff60845
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FindResourceExW
FindClose
FindNextFileW
FindFirstFileW
GetCurrentThreadId
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
InterlockedIncrement
InterlockedDecrement
GetModuleHandleW
lstrlenW
GetLastError
InitializeCriticalSection
FreeLibrary
MultiByteToWideChar
LoadLibraryExW
lstrcmpiW
LoadResource
FlushFileBuffers
CreateFileA
LockResource
SizeofResource
FindResourceW
RaiseException
GetFileAttributesW
WaitForSingleObject
CloseHandle
CreateProcessW
GetTempPathW
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
SetStdHandle
GetLocaleInfoA
GetStringTypeW
GetStringTypeA
GetModuleFileNameW
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
GetProcessHeap
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapCreate
VirtualFree
VirtualAlloc
GetProcAddress
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
Sleep
ExitProcess
RtlUnwind
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
SetFilePointer
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
InitializeCriticalSectionAndSpinCount
LoadLibraryA
LCMapStringA
LCMapStringW
user32
DefWindowProcW
CharNextW
DestroyWindow
advapi32
RegOpenKeyExW
RegQueryInfoKeyW
RegSetValueExW
RegEnumKeyExW
RegDeleteKeyW
RegCreateKeyExW
RegCloseKey
RegDeleteValueW
ole32
CoUninitialize
CoTaskMemFree
CoInitialize
CoCreateInstance
CoTaskMemRealloc
CoTaskMemAlloc
oleaut32
VarUI4FromStr
shlwapi
PathFindFileNameW
PathRemoveFileSpecW
PathAddBackslashW
comctl32
InitCommonControlsEx
Sections
.text Size: 67KB - Virtual size: 67KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 122KB - Virtual size: 121KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 572KB - Virtual size: 576KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE