Static task
static1
Behavioral task
behavioral1
Sample
aa06cd111cb6800e04353ec34723044b.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
aa06cd111cb6800e04353ec34723044b.exe
Resource
win10v2004-20230703-en
General
-
Target
aa06cd111cb6800e04353ec34723044b.exe
-
Size
1.1MB
-
MD5
aa06cd111cb6800e04353ec34723044b
-
SHA1
c5ac00783a74884144e742ef7b31f1830ba9b04b
-
SHA256
e919ae428cb8359cae0d30ceeb9f1c9b7470bb9bf75ba70d65d87c175b5d4a18
-
SHA512
e3e687352c932eebb558b3242a3ed7b0b33a0c7af4deaea7fa105d72f0d66da7b94e86866642a9628ce5272b6ef87a1a8f88971df07207a1061a0249dab5883e
-
SSDEEP
6144:4xquEWzU74wCPALLYdTBlIAOlBj+UHFiHLIxnQfy/odA2jzFwvdI:I0WzU74nzIrBjnAmnQigAOwO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource aa06cd111cb6800e04353ec34723044b.exe
Files
-
aa06cd111cb6800e04353ec34723044b.exe.exe windows x86
c35499a3c274c45eacc6e8d485573f91
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
SHSetLocalizedName
ord169
gdi32
GetArcDirection
ole32
CoGetApartmentType
CoGetObjectContext
kernel32
HeapSize
CreateFileW
GetProcessHeap
SetStdHandle
SetEnvironmentVariableW
GetModuleHandleA
GetModuleHandleW
RaiseException
GetCurrentThreadId
IsProcessorFeaturePresent
GetLastError
FreeLibraryWhenCallbackReturns
CreateThreadpoolWork
SubmitThreadpoolWork
CloseThreadpoolWork
GetModuleHandleExW
MultiByteToWideChar
InitializeConditionVariable
WakeConditionVariable
WakeAllConditionVariable
SleepConditionVariableSRW
InitOnceComplete
InitOnceBeginInitialize
GetStringTypeW
InitializeSRWLock
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
TryAcquireSRWLockExclusive
WideCharToMultiByte
CloseHandle
WaitForSingleObjectEx
QueryPerformanceCounter
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionEx
DeleteCriticalSection
EncodePointer
DecodePointer
LCMapStringEx
GetSystemTimeAsFileTime
GetProcAddress
WriteConsoleW
GetCPInfo
InitializeCriticalSectionAndSpinCount
SetEvent
ResetEvent
CreateEventW
GetCurrentProcessId
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
GetCurrentProcess
TerminateProcess
FreeEnvironmentStringsW
RtlUnwind
SetLastError
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
GetStdHandle
WriteFile
GetModuleFileNameW
ExitProcess
GetCommandLineA
GetCommandLineW
HeapAlloc
HeapFree
GetFileType
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
ReadFile
GetFileSizeEx
SetFilePointerEx
ReadConsoleW
HeapReAlloc
FindClose
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
Sections
.text Size: 160KB - Virtual size: 159KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 61KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 180KB - Virtual size: 184KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.B2 Size: 729KB - Virtual size: 728KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ