Static task
static1
Behavioral task
behavioral1
Sample
ae8b89cb3976c5a0c6975e937a8d8e9fb680546a969e1e64d970694eb70e7ab4.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
ae8b89cb3976c5a0c6975e937a8d8e9fb680546a969e1e64d970694eb70e7ab4.exe
Resource
win10v2004-20230915-en
General
-
Target
ae8b89cb3976c5a0c6975e937a8d8e9fb680546a969e1e64d970694eb70e7ab4
-
Size
3.2MB
-
MD5
3be374a4f3c41ba544d48732a69b6be3
-
SHA1
3bee1867c133641d87621caca8af667aca5186e2
-
SHA256
ae8b89cb3976c5a0c6975e937a8d8e9fb680546a969e1e64d970694eb70e7ab4
-
SHA512
81356216c2a3302184197c76698d95a572c66df85feea021a9bdbf08ca949570f430d579c6d8e4ee87833dd7af5bd3df3076cdba5acdfce2b78e7059727ac88b
-
SSDEEP
98304:S92EUO00xy2l0FiQyT6KxQSv7NrDVFqMVii:S92ieQjQSpqMVX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ae8b89cb3976c5a0c6975e937a8d8e9fb680546a969e1e64d970694eb70e7ab4
Files
-
ae8b89cb3976c5a0c6975e937a8d8e9fb680546a969e1e64d970694eb70e7ab4.exe windows:5 windows x86
a456b7bdd38d1ef1b9e91a008ed4a8cb
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetSystemTime
GetDiskFreeSpaceExW
lstrcmpW
WinExec
FreeLibraryAndExitThread
ExitThread
FlushConsoleInputBuffer
PeekNamedPipe
WaitForMultipleObjects
ExpandEnvironmentStringsA
VerifyVersionInfoA
GetSystemDirectoryA
GetModuleHandleA
SleepEx
GetFileAttributesExA
QueryPerformanceFrequency
ReadConsoleInputA
SetConsoleMode
GlobalMemoryStatus
FormatMessageA
GetTempPathW
LockResource
MultiByteToWideChar
FindResourceW
LoadLibraryExW
lstrcmpiW
SizeofResource
LoadResource
InterlockedDecrement
InterlockedIncrement
DeleteFileW
LoadLibraryW
lstrcpyW
WriteFile
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
QueryDosDeviceW
GetModuleHandleW
GetLogicalDriveStringsW
GetCurrentProcessId
OpenProcess
LocalFree
LocalAlloc
GetSystemDirectoryW
InitializeCriticalSectionAndSpinCount
GetLastError
RaiseException
HeapSize
HeapReAlloc
DecodePointer
CreateFileW
GetModuleFileNameW
ReadFile
GetFileSize
CreateEventW
Sleep
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
ResetEvent
WaitForSingleObjectEx
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
OutputDebugStringW
GetACP
GetTickCount
GetCurrentDirectoryW
FreeResource
ExitProcess
GlobalAlloc
GlobalLock
GlobalUnlock
GlobalFree
MulDiv
GetFileType
SetFilePointer
SetFileTime
DuplicateHandle
SystemTimeToFileTime
DosDateTimeToFileTime
CreateDirectoryW
GetLocalTime
GetLongPathNameW
GetFileAttributesW
GetTempFileNameW
CopyFileW
GetExitCodeProcess
FindClose
SetFileAttributesW
GetFileAttributesExW
FindFirstFileW
FindNextFileW
MoveFileExW
RemoveDirectoryW
ReadProcessMemory
CreateProcessW
FileTimeToSystemTime
ReleaseMutex
CreateMutexW
GetVolumeInformationW
GetWindowsDirectoryW
DeviceIoControl
OutputDebugStringA
SetPriorityClass
VerSetConditionMask
SetErrorMode
SystemTimeToTzSpecificLocalTime
GetVersion
VirtualAllocEx
VirtualFreeEx
WriteProcessMemory
lstrcpynW
RtlUnwind
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetModuleHandleExW
GetStdHandle
GetFullPathNameW
FindFirstFileExW
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetConsoleMode
ReadConsoleW
SetFilePointerEx
GetConsoleCP
GetStringTypeW
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableA
SetConsoleCtrlHandler
SetStdHandle
GetTimeZoneInformation
GetDriveTypeW
FlushFileBuffers
WriteConsoleW
SetEndOfFile
WaitForSingleObject
SetEvent
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
CreateThread
AreFileApisANSI
CloseHandle
IsBadReadPtr
LoadLibraryA
lstrlenW
GetNativeSystemInfo
SetLastError
GetProcessHeap
HeapFree
HeapAlloc
VirtualProtect
VirtualFree
VirtualAlloc
GetProcAddress
FreeLibrary
WritePrivateProfileStringW
GetPrivateProfileStringW
GetPrivateProfileIntW
WideCharToMultiByte
GetVersionExW
user32
GetWindowThreadProcessId
FindWindowExW
GetShellWindow
SystemParametersInfoW
GetClassInfoExW
RegisterClassExW
RegisterClassW
CallWindowProcW
DefWindowProcW
wsprintfW
GetWindow
GetParent
PtInRect
IsRectEmpty
MapWindowPoints
ScreenToClient
GetCursorPos
GetClientRect
GetUpdateRect
EndPaint
BeginPaint
ReleaseDC
GetDC
ReleaseCapture
SetCapture
GetKeyState
GetFocus
SetFocus
DestroyWindow
DispatchMessageW
TranslateMessage
GetMessageW
LoadCursorW
OffsetRect
InflateRect
SetCursor
SendMessageW
PostMessageW
PostQuitMessage
ShowWindow
SetWindowPos
SetTimer
InvalidateRect
GetWindowLongW
SetWindowLongW
LoadIconW
LoadStringW
IsWindow
SetForegroundWindow
MessageBoxA
GetUserObjectInformationW
GetProcessWindowStation
FindWindowW
GetClassNameW
CharNextW
MoveWindow
GetForegroundWindow
GetDesktopWindow
InvalidateRgn
CreateAcceleratorTableW
GetWindowTextLengthW
GetWindowTextW
SetWindowTextW
GetDoubleClickTime
GetSysColor
ClientToScreen
GetCaretPos
SetCaretPos
ShowCaret
GetWindowRect
HideCaret
CreateCaret
SetRect
FillRect
DrawTextW
CharPrevW
IntersectRect
UpdateLayeredWindow
SetWindowRgn
IsZoomed
IsIconic
GetMonitorInfoW
MonitorFromWindow
GetPropW
SetPropW
GetSystemMetrics
EnableWindow
KillTimer
CreateWindowExW
advapi32
CryptEnumProvidersA
RegEnumValueA
RegSetValueExW
RegQueryValueExW
RegOpenKeyExW
RegCreateKeyExW
RegCloseKey
RegDeleteValueW
RegEnumKeyExW
RegQueryInfoKeyW
RegOpenKeyExA
RegQueryValueExA
DeregisterEventSource
RegisterEventSourceA
ReportEventA
CryptAcquireContextA
CryptReleaseContext
CryptDestroyKey
CryptSetHashParam
CryptGetProvParam
CryptGetUserKey
CryptExportKey
CryptDecrypt
CryptCreateHash
CryptDestroyHash
CryptSignHashA
RegOpenKeyW
RegEnumKeyW
DuplicateTokenEx
LookupAccountSidW
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
GetTokenInformation
OpenProcessToken
ImpersonateLoggedOnUser
RevertToSelf
RegDeleteKeyW
shell32
ShellExecuteExW
SHBrowseForFolderW
SHGetPathFromIDListW
SHAppBarMessage
ShellExecuteW
SHGetSpecialFolderPathW
SHGetDataFromIDListW
SHGetDesktopFolder
SHGetFolderLocation
ord155
SHGetFileInfoW
SHGetFolderPathW
ole32
CLSIDFromString
CLSIDFromProgID
OleLockRunning
CoInitialize
CoCreateInstance
CoTaskMemAlloc
CoTaskMemRealloc
CoTaskMemFree
CoUninitialize
CreateStreamOnHGlobal
oleaut32
VariantInit
SysAllocString
SysFreeString
VariantClear
VarUI4FromStr
gdiplus
GdipCreateFontFromLogfontA
GdipCreateStringFormat
GdipDeleteStringFormat
GdiplusShutdown
GdipCloneBrush
GdipCreateBitmapFromStreamICM
GdipCreateBitmapFromStream
GdipDisposeImage
GdipFree
GdiplusStartup
GdipDeleteFont
GdipSetStringFormatAlign
GdipBitmapUnlockBits
GdipBitmapLockBits
GdipCreateBitmapFromScan0
GdipAlloc
GdipDrawImageRectI
GdipDeleteGraphics
GdipCreateFromHDC
GdipCreateFontFromDC
GdipSetTextRenderingHint
GdipCreateLineBrushI
GdipDeleteBrush
GdipSetStringFormatLineAlign
GdipDrawImageRectRectI
GdipGetPropertyItem
GdipGetPropertyItemSize
GdipImageSelectActiveFrame
GdipImageGetFrameCount
GdipImageGetFrameDimensionsList
GdipImageGetFrameDimensionsCount
GdipGetImageHeight
GdipGetImageWidth
GdipLoadImageFromStreamICM
GdipLoadImageFromStream
GdipDrawString
GdipCloneImage
shlwapi
PathAppendW
StrCpyW
PathFileExistsW
PathFindFileNameW
psapi
GetProcessImageFileNameW
GetModuleFileNameExW
EnumProcessModules
crypt32
CryptMsgClose
CertDuplicateCertificateContext
CertGetCertificateContextProperty
CertOpenStore
CertEnumCertificatesInStore
CryptMsgGetParam
CertCloseStore
CertFindCertificateInStore
CertFreeCertificateContext
CertGetNameStringW
CryptQueryObject
msimg32
AlphaBlend
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
wininet
InternetOpenW
InternetSetOptionW
InternetReadFile
InternetOpenUrlW
InternetCloseHandle
HttpQueryInfoW
urlmon
URLDownloadToFileW
comctl32
_TrackMouseEvent
ord17
gdi32
SetStretchBltMode
SetTextColor
MoveToEx
TextOutW
GetDeviceCaps
StretchBlt
SetBkMode
SetBkColor
ExtSelectClipRgn
GetObjectA
CreateBitmap
GetDIBits
CreateDCW
SelectClipRgn
RoundRect
LineTo
GetTextExtentPoint32W
GetClipBox
GetCharABCWidthsW
CreateSolidBrush
CreateRectRgnIndirect
CreatePenIndirect
CombineRgn
CreateRoundRectRgn
SetWindowOrgEx
GetObjectW
CreateDIBSection
GetTextMetricsW
SelectObject
SaveDC
RestoreDC
Rectangle
GetStockObject
DeleteObject
DeleteDC
CreatePen
CreateFontIndirectW
CreateCompatibleDC
CreateCompatibleBitmap
BitBlt
imm32
ImmReleaseContext
ImmSetCompositionWindow
ImmGetContext
ws2_32
bind
closesocket
connect
getpeername
getsockname
getsockopt
htons
ntohs
setsockopt
WSAIoctl
WSAStartup
WSACleanup
getaddrinfo
freeaddrinfo
accept
listen
recvfrom
sendto
ioctlsocket
send
recv
WSASetLastError
select
__WSAFDIsSet
socket
getservbyname
WSAGetLastError
gethostbyname
htonl
shutdown
gethostname
wldap32
ord301
ord200
ord30
ord79
ord35
ord33
ord32
ord27
ord26
ord22
ord41
ord60
ord211
ord46
ord217
ord143
ord50
Sections
.text Size: 1.9MB - Virtual size: 1.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 509KB - Virtual size: 509KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 50KB - Virtual size: 83KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.gfids Size: 512B - Virtual size: 436B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 41.3MB - Virtual size: 41.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 99KB - Virtual size: 98KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ