Static task
static1
Behavioral task
behavioral1
Sample
ab884c10cd0f342ff56c3062376a0e1f6e52e13f35ba42f2e8303acc318f1125.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ab884c10cd0f342ff56c3062376a0e1f6e52e13f35ba42f2e8303acc318f1125.exe
Resource
win10v2004-20241007-en
General
-
Target
ab884c10cd0f342ff56c3062376a0e1f6e52e13f35ba42f2e8303acc318f1125
-
Size
3.3MB
-
MD5
8d3e50fc83b986c6c772629e85354b53
-
SHA1
2124cf691a8b316f791533826afffab7aabaa1e3
-
SHA256
ab884c10cd0f342ff56c3062376a0e1f6e52e13f35ba42f2e8303acc318f1125
-
SHA512
d2e595d59626ecb9f19a6913d447abd18e0156634969d41165a15c05fdb57c3052f876d1a2113a05fc229a7105703062550189b427fb84f1cc792c5264ab472f
-
SSDEEP
49152:dA3wiBvq/C0cqZzBOBwskStCRLOqgrx8ubVhVjv7:+zv+cqZzBNskNChrx8ubVhVT7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ab884c10cd0f342ff56c3062376a0e1f6e52e13f35ba42f2e8303acc318f1125
Files
-
ab884c10cd0f342ff56c3062376a0e1f6e52e13f35ba42f2e8303acc318f1125.exe windows:4 windows x86 arch:x86
e78932f4fb286e46d7dbcf7ed82f9477
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
PropertySheetW
InitCommonControlsEx
ImageList_Write
ImageList_SetImageCount
ImageList_SetBkColor
ImageList_ReplaceIcon
ImageList_Remove
ImageList_Read
ImageList_GetImageCount
ImageList_GetIconSize
ImageList_Draw
ImageList_Destroy
ImageList_Create
ImageList_AddMasked
DestroyPropertySheetPage
CreateStatusWindowW
version
GetFileVersionInfoSizeA
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
kernel32
CreateProcessW
CreateSemaphoreW
CreateThread
DeleteCriticalSection
DeleteFileW
DeviceIoControl
DuplicateHandle
EnumResourceNamesW
EnumSystemLocalesA
ExitProcess
ExitThread
FileTimeToSystemTime
FindCloseChangeNotification
FindFirstChangeNotificationW
FindFirstFileW
FindNextChangeNotification
FindNextFileW
FindResourceExW
FindResourceW
FlushFileBuffers
FlushInstructionCache
FormatMessageA
FormatMessageW
FreeEnvironmentStringsW
GetACP
GetCommandLineW
GetConsoleCP
GetConsoleMode
GetCPInfo
GetCurrentDirectoryA
GetCurrentDirectoryW
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetDateFormatA
GetDateFormatW
GetDiskFreeSpaceExW
GetDiskFreeSpaceW
GetDriveTypeW
GetEnvironmentStringsW
GetEnvironmentVariableA
GetEnvironmentVariableW
GetFileAttributesExW
GetFileAttributesW
GetFileInformationByHandle
GetFileType
GetFullPathNameW
GetHandleInformation
GetLastError
GetLocaleInfoA
GetLocaleInfoW
GetLocalTime
GetLogicalDrives
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
GetModuleHandleW
GetNumberFormatW
GetOEMCP
GetOverlappedResult
GetPriorityClass
GetPrivateProfileStringW
GetPrivateProfileStructW
GetProcessHeap
GetStdHandle
GetStringTypeW
GetSystemDirectoryW
GetSystemInfo
GetSystemTime
GetSystemTimeAsFileTime
GetTempPathW
GetThreadContext
GetTimeFormatA
GetTimeFormatW
GetTimeZoneInformation
GetUserDefaultLCID
GetVersion
CreatePipe
GetVersionExW
GetVolumeInformationW
GetWindowsDirectoryW
GlobalAlloc
GlobalLock
GlobalUnlock
HeapAlloc
HeapCreate
HeapDestroy
HeapFree
HeapReAlloc
HeapSize
InterlockedCompareExchange
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
IsProcessorFeaturePresent
IsValidCodePage
IsValidLocale
LCMapStringW
LoadLibraryExW
LoadLibraryW
LoadResource
LocalFree
LockResource
lstrcmpA
lstrcmpiW
lstrcmpW
lstrlenA
lstrlenW
MapViewOfFile
MoveFileExW
MulDiv
MultiByteToWideChar
OpenEventA
OpenEventW
OpenMutexW
OpenProcess
OutputDebugStringA
QueryDosDeviceW
QueryPerformanceCounter
QueryPerformanceFrequency
RaiseException
ReadFile
ReadProcessMemory
ReleaseSemaphore
RemoveDirectoryW
ResetEvent
ResumeThread
SetConsoleTextAttribute
SetEndOfFile
SetEnvironmentVariableA
SetErrorMode
SetEvent
SetFileTime
SetHandleCount
SetLastError
SetNamedPipeHandleState
SetPriorityClass
SetStdHandle
SetThreadPriority
SetUnhandledExceptionFilter
SizeofResource
Sleep
SuspendThread
SystemTimeToFileTime
SystemTimeToTzSpecificLocalTime
TerminateProcess
TerminateThread
TlsAlloc
TlsFree
TlsGetValue
TlsSetValue
TransactNamedPipe
UnmapViewOfFile
VirtualAlloc
VirtualFree
VirtualQuery
WaitForMultipleObjectsEx
WaitForSingleObjectEx
WaitNamedPipeW
WideCharToMultiByte
WriteConsoleW
WriteFile
WritePrivateProfileStringW
WritePrivateProfileStructW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetCurrentProcess
GetStartupInfoA
RtlUnwind
CreateMutexW
CreateFileW
CreateFileMappingW
CreateFileA
CreateEventW
CreateEventA
CompareStringW
CompareFileTime
CloseHandle
GetStartupInfoW
GetCommandLineA
InitializeCriticalSection
EnterCriticalSection
GetTickCount
LeaveCriticalSection
FreeLibrary
GetSystemDirectoryA
LoadLibraryA
GetProcAddress
GetStringTypeA
LCMapStringA
GetVersionExA
user32
MessageBoxA
MapWindowPoints
MessageBoxW
comdlg32
CommDlgExtendedError
advapi32
CloseServiceHandle
ControlService
FreeSid
GetUserNameA
GetUserNameW
InitializeSecurityDescriptor
InitiateSystemShutdownW
LookupPrivilegeValueW
OpenProcessToken
OpenSCManagerW
OpenServiceW
QueryServiceStatus
RegCloseKey
RegCreateKeyExW
RegDeleteKeyW
RegDeleteValueW
StartServiceW
SetSecurityDescriptorDacl
RegSetValueExW
RegQueryValueExW
RegQueryInfoKeyW
RegOpenKeyExW
RegEnumKeyExW
AllocateAndInitializeSid
shell32
ShellExecuteExW
ShellExecuteW
Shell_NotifyIconW
ole32
CoCreateInstance
CoUninitialize
CoTaskMemFree
CreateStreamOnHGlobal
CoTaskMemRealloc
CoTaskMemAlloc
shlwapi
PathIsUNCA
PathMatchSpecW
PathRemoveFileSpecW
PathRemoveExtensionW
PathIsDirectoryW
PathAppendW
PathCombineW
PathFileExistsW
PathFindFileNameA
Sections
.text Size: 2.0MB - Virtual size: 2.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ