Static task
static1
Behavioral task
behavioral1
Sample
ace95e689144981fd0826c2ebdad9dcf9814fa76f4ef275e63617601aa37e92d.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
ace95e689144981fd0826c2ebdad9dcf9814fa76f4ef275e63617601aa37e92d.exe
Resource
win10v2004-20230915-en
General
-
Target
ace95e689144981fd0826c2ebdad9dcf9814fa76f4ef275e63617601aa37e92d
-
Size
4.8MB
-
MD5
9122c91cab89342d16a7156e8070adb8
-
SHA1
ca803248c481005b1f5beaf482f7bddbab7d5167
-
SHA256
ace95e689144981fd0826c2ebdad9dcf9814fa76f4ef275e63617601aa37e92d
-
SHA512
5b5ddc6f97a3f2f6a3413464a112adad389562372242cc3d51e3c2e9646d7bdd798a9fb421224f9b4be8ac74dfe1c63bc6f5e03b5924457c8d179896b133b081
-
SSDEEP
98304:2KWnkJP21P6wSN67R96dIuQf6dPtBsSypAcrK0S+4q1EK1tj2aL:211CwSNy96O4bxypA+y+4qt/j2aL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ace95e689144981fd0826c2ebdad9dcf9814fa76f4ef275e63617601aa37e92d
Files
-
ace95e689144981fd0826c2ebdad9dcf9814fa76f4ef275e63617601aa37e92d.exe windows:5 windows x86
74afb705b970a93a355504882605591a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcessHeap
LocalFree
TerminateProcess
SetLastError
OpenProcess
GetExitCodeProcess
WaitForSingleObject
FormatMessageA
WideCharToMultiByte
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
GetLogicalDriveStringsW
QueryDosDeviceW
GetWindowsDirectoryW
CreateEventW
SetEvent
FindClose
FindFirstFileW
GetFullPathNameW
FindNextFileW
ExpandEnvironmentStringsW
LoadLibraryExW
lstrcmpA
lstrcmpW
FreeResource
ExitProcess
GetFileAttributesW
SetFileAttributesW
RemoveDirectoryW
lstrcmpiW
VirtualProtect
MoveFileExW
SetEnvironmentVariableW
GetVersionExW
GetCommandLineW
FindResourceExW
InitializeCriticalSectionAndSpinCount
RaiseException
DeleteCriticalSection
SetFilePointer
SetEndOfFile
WriteConsoleW
SetStdHandle
HeapAlloc
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindFirstFileExW
SetFilePointerEx
HeapFree
HeapReAlloc
HeapSize
HeapDestroy
GetCurrentProcess
DeleteFileW
GetTempFileNameW
WriteFile
GetModuleHandleW
CloseHandle
GetProcAddress
CreateFileW
MultiByteToWideChar
OutputDebugStringW
SetCurrentDirectoryW
GetCurrentDirectoryW
GetModuleFileNameW
FindResourceW
LoadResource
LockResource
SizeofResource
LoadLibraryW
VerifyVersionInfoW
VerSetConditionMask
FreeLibrary
Sleep
GetTickCount
GetLastError
QueryPerformanceFrequency
GetModuleHandleExW
FreeLibraryAndExitThread
ExitThread
CreateThread
RtlUnwind
TlsFree
CreatePipe
GetFileAttributesExW
GetTimeZoneInformation
GetStringTypeW
GetCPInfo
ReadConsoleW
GetConsoleMode
GetConsoleCP
FlushFileBuffers
TlsSetValue
TlsGetValue
TlsAlloc
SetFileTime
CreateDirectoryW
InitializeSListHead
GetSystemTimeAsFileTime
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
CompareStringW
GetTimeFormatW
GetDateFormatW
GetFileType
CreateMutexW
GetACP
GetStdHandle
ReadFile
GetCurrentThreadId
GetCurrentProcessId
CreateProcessA
DuplicateHandle
IsDebuggerPresent
EnterCriticalSection
LeaveCriticalSection
GetModuleFileNameA
LoadLibraryExA
ResetEvent
WaitForSingleObjectEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
GetStartupInfoW
QueryPerformanceCounter
GetTempPathW
user32
GetWindowThreadProcessId
EnumWindows
FindWindowW
PostMessageW
MessageBoxW
OpenClipboard
EmptyClipboard
CloseClipboard
LoadStringW
ExitWindowsEx
SwitchToThisWindow
PeekMessageW
GetMessageW
TranslateMessage
DispatchMessageW
advapi32
CopySid
OpenSCManagerW
RegDeleteValueW
RegEnumKeyExW
RegDeleteKeyW
RegSetValueExW
RegCreateKeyExW
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
SetNamedSecurityInfoW
OpenProcessToken
AdjustTokenPrivileges
LookupPrivilegeValueW
AddAce
InitializeAcl
IsValidSid
GetLengthSid
LookupAccountNameW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
QueryServiceStatusEx
EnumDependentServicesW
ControlService
StartServiceW
OpenServiceW
CloseServiceHandle
shell32
ShellExecuteW
ShellExecuteExW
SHFileOperationW
DragQueryFileW
SHChangeNotify
SHGetSpecialFolderPathW
ord190
ord165
CommandLineToArgvW
SHCreateDirectoryExW
ole32
OleGetClipboard
CoUninitialize
PropVariantClear
CoInitialize
CoCreateInstance
ReleaseStgMedium
OleUninitialize
CoTaskMemFree
OleInitialize
oleaut32
VariantClear
VariantInit
VarBstrCmp
SysAllocStringLen
SysFreeString
SysAllocString
shlwapi
PathFindFileNameW
PathRemoveFileSpecW
SHStrDupW
PathAddBackslashW
PathAppendW
StrToIntExW
PathIsDirectoryW
PathCombineW
PathFileExistsW
comctl32
InitCommonControlsEx
version
GetFileVersionInfoW
GetFileVersionInfoSizeW
VerQueryValueW
psapi
GetProcessImageFileNameW
urlmon
URLDownloadToFileW
Sections
.text Size: 369KB - Virtual size: 368KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 99KB - Virtual size: 98KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 368B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 446.6MB - Virtual size: 446.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ