Static task
static1
Behavioral task
behavioral1
Sample
aaf3c6d822257e2ceb267ee4df17dc7097db09fa84708439f7abd9e7b3a5c499.exe
Resource
win10v2004-20230220-en
General
-
Target
aaf3c6d822257e2ceb267ee4df17dc7097db09fa84708439f7abd9e7b3a5c499
-
Size
489KB
-
MD5
a8557c3d8a2f18062be710d81f99d9e6
-
SHA1
ea7ccf2cc82404899d217eefa2115ec9d78def78
-
SHA256
aaf3c6d822257e2ceb267ee4df17dc7097db09fa84708439f7abd9e7b3a5c499
-
SHA512
bcfe98dcc04905c90d99c01b2bb38aafeb110c433146712ff38b5baacb8a53f8ee47a45b61328ebda75c641cac131f90875851daac8a65b89e861d17678daf04
-
SSDEEP
6144:oqxJ2zwJowzPAxBNqjTr0lQx047L8pmkuCJtREHoRPS6bBV5GO0SlbtGvZWro:Tj2zwJVABNA2QX8pmNQREHeRIO0WDr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource aaf3c6d822257e2ceb267ee4df17dc7097db09fa84708439f7abd9e7b3a5c499
Files
-
aaf3c6d822257e2ceb267ee4df17dc7097db09fa84708439f7abd9e7b3a5c499.exe windows x86
1875cf125a8fa758eee6755fb2f4b449
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDriveTypeW
InterlockedIncrement
InterlockedDecrement
SetMailslotInfo
GetLogicalDriveStringsW
WritePrivateProfileSectionA
GetSystemWindowsDirectoryW
FreeEnvironmentStringsA
GetProcessPriorityBoost
EnumCalendarInfoExW
GetConsoleTitleA
WaitNamedPipeW
EnumTimeFormatsW
GetDriveTypeA
GetVolumePathNameW
GetPrivateProfileIntA
GetSystemPowerStatus
GetCalendarInfoA
GetProcessHandleCount
GetConsoleAliasExesLengthW
LeaveCriticalSection
GetFileAttributesA
GetFileAttributesW
WriteConsoleW
GetModuleFileNameW
GetShortPathNameA
EnumSystemLocalesA
DeleteFiber
GetStringTypeA
GetProcAddress
HeapSize
MoveFileW
SetComputerNameA
SearchPathA
GetDiskFreeSpaceW
OpenWaitableTimerA
LoadLibraryA
GetProcessId
InterlockedExchangeAdd
LocalAlloc
DeleteTimerQueue
SetCalendarInfoW
BuildCommDCBAndTimeoutsW
FindFirstVolumeMountPointW
IsSystemResumeAutomatic
AddAtomW
OpenJobObjectW
GetPrivateProfileStructA
FindFirstVolumeMountPointA
EnumDateFormatsA
GetModuleHandleA
FindNextFileW
CompareStringA
GetShortPathNameW
SetFileShortNameA
FindAtomW
DeleteFileW
AreFileApisANSI
CreateMutexW
SetLastError
GetVolumeNameForVolumeMountPointA
GetLastError
HeapFree
DeleteFileA
WideCharToMultiByte
HeapReAlloc
GetCommandLineA
HeapSetInformation
GetStartupInfoW
RaiseException
HeapAlloc
IsProcessorFeaturePresent
HeapCreate
EnterCriticalSection
SetFilePointer
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
DecodePointer
TerminateProcess
GetCurrentProcess
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
GetCurrentThreadId
ExitProcess
WriteFile
GetModuleFileNameA
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
RtlUnwind
LCMapStringW
MultiByteToWideChar
GetStringTypeW
LoadLibraryW
CloseHandle
CreateFileW
gdi32
GetCharABCWidthsW
SelectObject
Sections
.text Size: 75KB - Virtual size: 75KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 305KB - Virtual size: 40.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 108KB - Virtual size: 107KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ