Static task
static1
Behavioral task
behavioral1
Sample
b4ab459009dcddc666db09b17472a70ab0d3e87838711f5e85606353e322d0cbN.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b4ab459009dcddc666db09b17472a70ab0d3e87838711f5e85606353e322d0cbN.exe
Resource
win10v2004-20240802-en
General
-
Target
b4ab459009dcddc666db09b17472a70ab0d3e87838711f5e85606353e322d0cbN
-
Size
6.6MB
-
MD5
656c6c08423b90040270bbb368d86300
-
SHA1
8e84a7ae65327ec66cd47a8673141478902fea46
-
SHA256
b4ab459009dcddc666db09b17472a70ab0d3e87838711f5e85606353e322d0cb
-
SHA512
4a21fca5f860c00335d16ccf4d3cc480d15a2e6b5432da713ab2948c2bd33c5c65d668754054b844aff27fb02dcd2b7622075e5079ed9622a4908f75f5f091c5
-
SSDEEP
196608:Ud9RBgw9eQ6VrV+A89q0tXfM5QRjSLdjns:876VsA8XNM5uSLdjs
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b4ab459009dcddc666db09b17472a70ab0d3e87838711f5e85606353e322d0cbN
Files
-
b4ab459009dcddc666db09b17472a70ab0d3e87838711f5e85606353e322d0cbN.exe windows:6 windows x86 arch:x86
7b1f5c6849b9623442348003aa195a9f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualProtect
VirtualFree
VirtualAlloc
GetModuleHandleA
FreeLibraryAndExitThread
FreeLibrary
GetThreadTimes
OutputDebugStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
WriteFile
GetModuleFileNameW
GetFileType
GetStdHandle
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
IsDebuggerPresent
GetProcessHeap
HeapAlloc
HeapSize
WideCharToMultiByte
MultiByteToWideChar
ReleaseSemaphore
GetModuleHandleExW
ExitProcess
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
SetThreadPriority
SwitchToThread
WaitForSingleObjectEx
SetEvent
CreateTimerQueue
HeapFree
LoadLibraryExW
CreateThread
CreateSemaphoreW
GetProcAddress
GetModuleHandleW
GetTickCount
GetStartupInfoW
TlsFree
TlsSetValue
InitializeSListHead
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
UnregisterWaitEx
LCMapStringW
GetStringTypeW
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetFilePointerEx
LoadLibraryW
SetStdHandle
WriteConsoleW
lstrcpyW
SuspendThread
GetVersion
WinExec
GetUserDefaultUILanguage
GetSystemInfo
RemoveDirectoryW
GetLastError
GetCPInfoExW
GetTempPathW
FileTimeToSystemTime
SystemTimeToFileTime
HeapCreate
ReadProcessMemory
Sleep
GetUserDefaultLangID
GetLogicalDrives
CompareFileTime
SystemTimeToTzSpecificLocalTime
LoadResource
FindResourceW
GetSystemDefaultUILanguage
FindFirstFileW
GetFileSize
EnumResourceNamesW
GetTempFileNameW
ResumeThread
GetThreadPriority
QueryDosDeviceW
VerifyVersionInfoW
ExitThread
GetFileAttributesW
lstrcpynW
GetVersionExW
FormatMessageW
GetPrivateProfileStringW
SignalObjectAndWait
VerSetConditionMask
EnumCalendarInfoW
TlsGetValue
TlsAlloc
TerminateProcess
CreateEventW
InitializeCriticalSectionAndSpinCount
SetLastError
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsProcessorFeaturePresent
RtlUnwind
RaiseException
GetCommandLineW
HeapReAlloc
DecodePointer
EncodePointer
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetSystemTimeAsFileTime
CloseHandle
DuplicateHandle
WaitForSingleObject
GetCurrentProcess
GetCurrentThread
GetCurrentThreadId
GetExitCodeThread
CreateFileW
user32
CheckRadioButton
SetWindowRgn
HideCaret
GetWindowRect
CharUpperBuffW
GetMessageW
CharNextW
TrackPopupMenu
IsIconic
GetKeyState
DeleteMenu
LoadIconA
RemovePropA
CharLowerBuffW
GetClientRect
CreateMenu
DrawEdge
GetMenuItemInfoW
GetQueueStatus
GetCapture
GetKeyboardState
GetMenu
OffsetRect
MessageBoxA
InvalidateRect
GetWindowTextW
ReleaseDC
MonitorFromWindow
ScrollWindow
DefWindowProcA
SetWindowsHookExA
RedrawWindow
GetWindow
GetSysColorBrush
AppendMenuA
PostMessageA
CreateWindowExW
ShowWindow
SystemParametersInfoA
ReleaseCapture
ScrollWindowEx
GetDlgItemTextW
SendMessageW
UpdateWindow
EnableWindow
GetDlgCtrlID
SetWindowTextW
SetDlgItemTextA
GetMonitorInfoW
TranslateMDISysAccel
GetMessageTime
MsgWaitForMultipleObjects
ShowOwnedPopups
SetTimer
MapDialogRect
PostQuitMessage
SetCapture
KillTimer
IsZoomed
SetFocus
SetScrollRange
GetDoubleClickTime
GetDC
ShowCursor
SetRect
SetWindowLongA
LoadMenuW
GetClassNameW
EnableMenuItem
GetDlgItem
GetDesktopWindow
GetSysColor
CreatePopupMenu
GetMenuItemCount
IsWindow
GetKeyboardType
SetCaretPos
SetWindowTextA
MapWindowPoints
ValidateRect
RegisterClassA
gdi32
EndPage
GetTextExtentPoint32W
PatBlt
LineTo
MaskBlt
GetDeviceCaps
CreateFontIndirectA
SetBkColor
GdiFlush
CreateHalftonePalette
CreateBitmap
CreatePenIndirect
PolyPolyline
CreateRectRgnIndirect
SetMapMode
CreateCompatibleBitmap
Rectangle
CreateBrushIndirect
SaveDC
GetObjectType
GetCurrentPositionEx
SelectPalette
GetTextExtentPointA
GetCharABCWidthsFloatA
CreatePen
GetClipBox
RoundRect
SetTextAlign
GetPixel
ExtTextOutA
RestoreDC
CreateSolidBrush
TextOutA
GetBitmapBits
BitBlt
GetWindowOrgEx
SetTextColor
GetCharacterPlacementW
DeleteDC
CreateFontA
CopyEnhMetaFileA
CreatePalette
DeleteObject
GetPaletteEntries
CreateRectRgn
UpdateColors
SelectObject
comdlg32
FindTextW
GetSaveFileNameW
GetOpenFileNameW
advapi32
ControlService
GetLengthSid
RegSetKeySecurity
AllocateAndInitializeSid
RegConnectRegistryW
StartServiceW
RegGetKeySecurity
InitializeSecurityDescriptor
RegQueryInfoKeyW
CopySid
EqualSid
shell32
ShellExecuteW
SHGetFileInfoW
ShellExecuteExW
CommandLineToArgvW
ExtractIconExW
Shell_NotifyIconW
ole32
CoInitialize
oleaut32
SafeArrayGetUBound
SafeArrayPtrOfIndex
VariantChangeType
VariantInit
VariantClear
SafeArrayGetLBound
SysFreeString
VariantCopy
SysReAllocStringLen
Sections
.text Size: 674KB - Virtual size: 673KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6.0MB - Virtual size: 6.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pupW Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ