Static task
static1
Behavioral task
behavioral1
Sample
aa0a7052d29a01c3ff13e4ba54436eec322c7beda5d83d74d13445de8ace99ef.exe
Resource
win10-20230703-en
General
-
Target
aa0a7052d29a01c3ff13e4ba54436eec322c7beda5d83d74d13445de8ace99ef
-
Size
153.7MB
-
MD5
2938099c74ea4fbb9bc224230b7ff92d
-
SHA1
170ad490ffa92a69ad3293b352887e2c3f49a345
-
SHA256
aa0a7052d29a01c3ff13e4ba54436eec322c7beda5d83d74d13445de8ace99ef
-
SHA512
525a7f2fe81e121f2496cadb9b6abf5ec6f1ec0ecbb249a025978f34d6d72e63bcdf9599f970136bffaa175b8b8484d1a144fea80db0279992c79ee7d7f490cd
-
SSDEEP
3145728:EzcI0E3ggdnIEMFwHj0ZxguqYTV0egufV6uh5zt5p3TCPWm0Mhcqiak9jLzF:1I0UggdnIEvj08uqmjfEuh5bpDvm0MWl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource aa0a7052d29a01c3ff13e4ba54436eec322c7beda5d83d74d13445de8ace99ef
Files
-
aa0a7052d29a01c3ff13e4ba54436eec322c7beda5d83d74d13445de8ace99ef.exe windows x86
20bb833a9686ace5703ee3e638e18050
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteFile
DeleteFileW
GetFileSize
CreateFileMappingW
MapViewOfFile
UnmapViewOfFile
CreateProcessW
WaitForSingleObject
GetExitCodeProcess
RemoveDirectoryW
MoveFileExW
GetCommandLineW
CloseHandle
CreateFileW
LocalFree
GetFileAttributesW
CreateDirectoryW
GetFullPathNameW
GetTempPathW
GetTempFileNameW
GetCurrentDirectoryW
MultiByteToWideChar
WideCharToMultiByte
GetStringTypeW
FlushFileBuffers
SetFilePointer
ReadFile
GetLastError
GetPrivateProfileIntW
FormatMessageA
GetPrivateProfileStringW
WriteConsoleW
SetStdHandle
RaiseException
InterlockedExchange
FreeLibrary
GetProcAddress
LoadLibraryExA
EncodePointer
DecodePointer
HeapFree
HeapAlloc
IsDebuggerPresent
IsProcessorFeaturePresent
RtlUnwind
InterlockedDecrement
ExitProcess
GetModuleHandleExW
AreFileApisANSI
HeapSize
Sleep
GetStdHandle
GetModuleFileNameW
SetLastError
InterlockedIncrement
GetCurrentThreadId
GetProcessHeap
GetFileType
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleW
EnterCriticalSection
LeaveCriticalSection
GetConsoleMode
ReadConsoleW
GetConsoleCP
SetFilePointerEx
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
LoadLibraryExW
HeapReAlloc
OutputDebugStringW
LoadLibraryW
LCMapStringW
SetEndOfFile
user32
MessageBoxW
advapi32
RegisterTraceGuidsW
GetTraceEnableFlags
GetTraceEnableLevel
GetTraceLoggerHandle
TraceMessage
UnregisterTraceGuids
rpcrt4
UuidCreate
RpcStringFreeW
UuidToStringW
shlwapi
PathIsRelativeW
Sections
.text Size: 93KB - Virtual size: 93KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 41KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ