Static task
static1
Behavioral task
behavioral1
Sample
ab9189d383bd0d315a7995ac223a84d7811395e83de87e38526fe045eee78619N.exe
Resource
win7-20240903-en
General
-
Target
ab9189d383bd0d315a7995ac223a84d7811395e83de87e38526fe045eee78619N
-
Size
960KB
-
MD5
0abf0ac603d51cfa6850413a18721780
-
SHA1
97d6909503fd1525961e01ddb9d4691d3baa6199
-
SHA256
ab9189d383bd0d315a7995ac223a84d7811395e83de87e38526fe045eee78619
-
SHA512
ae7b9cf74c6e7a270e82858ddf9ca230c1bfda13e758d9584330c7a3e6ed9409afc7604da52d4cbb2a8249183b1d10e1b91840c80b1567539e10c39a28e57ac0
-
SSDEEP
24576:JVlboZSVXLno24ClHXqP/52PDA2Rf9oPd:/6xP/523oPd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ab9189d383bd0d315a7995ac223a84d7811395e83de87e38526fe045eee78619N
Files
-
ab9189d383bd0d315a7995ac223a84d7811395e83de87e38526fe045eee78619N.exe windows:4 windows x86 arch:x86
df68918f1d754b2efea2af3058115004
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_REMOVABLE_RUN_FROM_SWAP
IMAGE_FILE_NET_RUN_FROM_SWAP
Imports
shell32
ShellExecuteA
SHGetPathFromIDListA
SHGetSpecialFolderLocation
user32
MessageBoxA
wvsprintfA
GetKeyboardType
wsprintfA
CharPrevA
LoadStringA
LoadIconA
IsCharAlphaNumericA
DispatchMessageA
TranslateMessage
PeekMessageA
MsgWaitForMultipleObjects
ReleaseDC
GetDC
MessageBoxIndirectA
MessageBeep
CharNextA
SetForegroundWindow
FindWindowA
PostQuitMessage
PostMessageA
DefWindowProcA
CreateWindowExA
UpdateWindow
ShowWindow
UnregisterClassA
RegisterClassExA
SetWindowLongA
DestroyWindow
InvalidateRect
GetWindowLongA
RegisterClassA
GetSystemMetrics
GetSysColor
BeginPaint
GetWindowRect
ExitWindowsEx
SetWindowPos
EndPaint
LoadCursorA
gdi32
SetBkMode
SelectObject
CreateFontIndirectA
SetTextColor
GetTextExtentPoint32A
TextOutA
GetStockObject
RemoveFontResourceA
AddFontResourceA
GetDeviceCaps
ole32
CoGetMalloc
advapi32
RegOpenKeyA
LookupPrivilegeValueA
AdjustTokenPrivileges
RegQueryInfoKeyA
RegEnumKeyExA
RegCreateKeyExA
AllocateAndInitializeSid
OpenProcessToken
GetTokenInformation
EqualSid
FreeSid
RegDeleteValueA
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegDeleteKeyA
kernel32
lstrcatA
GetProcAddress
FindFirstFileA
RtlUnwind
GetTempPathA
HeapCreate
HeapDestroy
VirtualFree
GetStdHandle
SetHandleCount
GetFileType
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
UnhandledExceptionFilter
TerminateProcess
FreeEnvironmentStringsA
LCMapStringA
HeapAlloc
LCMapStringW
ExitProcess
GetCommandLineA
HeapFree
GetModuleHandleA
RaiseException
GetStartupInfoA
LocalReAlloc
VirtualAlloc
GetOEMCP
GetACP
HeapReAlloc
GetStringTypeA
GetDriveTypeA
GetVolumeInformationA
GetSystemDefaultLCID
DebugBreak
ReleaseMutex
WideCharToMultiByte
MultiByteToWideChar
Sleep
GetCurrentProcess
CopyFileA
ReadFile
FindNextFileA
GetVersionExA
GetCPInfo
GetStringTypeW
GetFileAttributesA
GetLastError
GetModuleFileNameA
DeleteFileA
lstrlenA
CreateMutexA
SetLastError
lstrcpyA
lstrcmpiA
lstrcpynA
SetFileAttributesA
LocalAlloc
GetFullPathNameA
ExpandEnvironmentStringsA
lstrcmpA
GetPrivateProfileStringA
CloseHandle
WriteFile
SetFilePointer
CreateFileA
CreateDirectoryA
FindClose
MulDiv
InterlockedExchange
GetTimeFormatA
GetDateFormatA
OpenMutexA
GetPrivateProfileSectionA
GlobalFree
GlobalAlloc
GetSystemDefaultLangID
GetVersion
GetSystemDirectoryA
GetWindowsDirectoryA
SetCurrentDirectoryA
FreeLibrary
LoadLibraryA
GetExitCodeProcess
WaitForSingleObject
CreateProcessA
GetCurrentDirectoryA
IsDBCSLeadByte
LocalFree
FormatMessageA
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
mpr
WNetGetConnectionA
Sections
.text Size: 88KB - Virtual size: 85KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 148KB - Virtual size: 144KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 52KB - Virtual size: 127KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 168KB - Virtual size: 165KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vmp0 Size: 500KB - Virtual size: 1.6MB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE