Static task
static1
Behavioral task
behavioral1
Sample
aa49e496d692c6e1c782df3df3c16aac3c42730c89ff1d247a71276105d96e9d.exe
Resource
win10-20230703-en
General
-
Target
aa49e496d692c6e1c782df3df3c16aac3c42730c89ff1d247a71276105d96e9d
-
Size
787KB
-
MD5
2c613f9b1c0fb8e52dfa49c8aecef191
-
SHA1
8f46cd5f41d93911fe14d16c740e17ea9ed72a3f
-
SHA256
aa49e496d692c6e1c782df3df3c16aac3c42730c89ff1d247a71276105d96e9d
-
SHA512
45be2825b0f98a4f0458b8365e419861fa982829a20e4246efd147a2d210c8d43b54147485df6c2e91154a1b3cfe3bb38d2d36caec93e2cc47e8c75a1baf2a6d
-
SSDEEP
12288:+UqnqkkIT75IIhFDrspEr/mUXpoCYCLA4sc5CsxuAyW6IHdxiRmBQ7JvBacML7M:+xN5T1e654ECDlWJHKR+Q7JvBanM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource aa49e496d692c6e1c782df3df3c16aac3c42730c89ff1d247a71276105d96e9d
Files
-
aa49e496d692c6e1c782df3df3c16aac3c42730c89ff1d247a71276105d96e9d.exe windows x86
f2d4adc959fb5a4f1a3790b0fe927782
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FillConsoleOutputCharacterA
SearchPathW
FindResourceA
lstrlenA
WritePrivateProfileStructA
GetConsoleAliasesLengthW
PeekNamedPipe
TlsGetValue
AllocConsole
FindResourceW
HeapAlloc
_lwrite
InterlockedDecrement
InterlockedCompareExchange
GetTickCount
FormatMessageA
GetCompressedFileSizeW
GlobalAlloc
GetLocaleInfoW
WriteConsoleOutputA
TransactNamedPipe
CreateActCtxA
DisconnectNamedPipe
GetConsoleAliasesW
GetProfileIntA
GetDateFormatW
GetLastError
lstrcmpiA
GetProcAddress
AttachConsole
VirtualAlloc
CreateMemoryResourceNotification
SetFileApisToOEM
LoadLibraryA
InterlockedExchangeAdd
DeleteTimerQueue
FindNextChangeNotification
Module32FirstW
EnumResourceTypesW
GetThreadPriority
GetCommTimeouts
UpdateResourceW
GetStringTypeW
OpenSemaphoreW
ReadConsoleInputW
GetWindowsDirectoryW
GetCurrentProcessId
AddConsoleAliasA
ResetWriteWatch
CreateFileA
SetStdHandle
WriteConsoleW
OpenMutexW
GetComputerNameA
InterlockedIncrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetStartupInfoW
RtlUnwind
RaiseException
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
GetCPInfo
HeapCreate
VirtualFree
HeapReAlloc
GetModuleHandleW
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
HeapSize
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetACP
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
InitializeCriticalSectionAndSpinCount
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetFilePointer
CloseHandle
WriteConsoleA
GetConsoleOutputCP
user32
CharUpperBuffA
LoadMenuW
CharLowerBuffA
CharToOemBuffA
advapi32
InitiateSystemShutdownA
Sections
.text Size: 674KB - Virtual size: 674KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 31.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 62KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ