Static task
static1
Behavioral task
behavioral1
Sample
aaf5e2e5dc681155638c52702ea95b26df143c8e72320f8e7aaf792e2892e113.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
aaf5e2e5dc681155638c52702ea95b26df143c8e72320f8e7aaf792e2892e113.exe
Resource
win10v2004-20230915-en
General
-
Target
aaf5e2e5dc681155638c52702ea95b26df143c8e72320f8e7aaf792e2892e113
-
Size
2.1MB
-
MD5
35361e281f1a53e480736680bc12590a
-
SHA1
af4617cd986231e49a7c9c78e8a119688eef6adc
-
SHA256
aaf5e2e5dc681155638c52702ea95b26df143c8e72320f8e7aaf792e2892e113
-
SHA512
4493f2b50641411eabf6bb9ac349a816145a264fefa585304aaae7900fd5c46ecf7caeb31059813819409d5f96905868174059576b88244e305bad2cef5a982e
-
SSDEEP
49152:QamxCtU+WVenEtCp6KyuwlC79+bbeEWs77BCTsX+TYnV:ix3sn6q6KyqE19f/SYV
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource aaf5e2e5dc681155638c52702ea95b26df143c8e72320f8e7aaf792e2892e113
Files
-
aaf5e2e5dc681155638c52702ea95b26df143c8e72320f8e7aaf792e2892e113.exe windows:5 windows x86
ef22939fe53da4f0b3f5f815ff6986a4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_REMOVABLE_RUN_FROM_SWAP
IMAGE_FILE_NET_RUN_FROM_SWAP
Imports
advapi32
InitiateSystemShutdownA
GetLengthSid
GetTokenInformation
OpenProcessToken
AllocateAndInitializeSid
CryptReleaseContext
CryptGenRandom
CryptAcquireContextA
SetSecurityDescriptorDacl
AddAccessAllowedAce
InitializeAcl
InitializeSecurityDescriptor
kernel32
SetFilePointer
FormatMessageA
LeaveCriticalSection
RemoveDirectoryA
GetLastError
DeleteFileA
MoveFileExA
EnterCriticalSection
TerminateProcess
SetEvent
Sleep
SetEnvironmentVariableA
GetEnvironmentVariableA
WideCharToMultiByte
HeapAlloc
ReadFile
CreateFileA
ExitProcess
DeleteCriticalSection
FreeLibrary
FlushFileBuffers
GetSystemDirectoryA
GetVersionExA
GetProcAddress
LoadLibraryA
WaitForSingleObject
OpenEventA
WriteFile
GetCurrentProcess
CreateDirectoryA
GetFileAttributesA
SetFileTime
LocalFileTimeToFileTime
CloseHandle
GetExitCodeProcess
CreateProcessA
GetCurrentDirectoryA
SystemTimeToFileTime
GetSystemTime
GetDiskFreeSpaceA
QueryDosDeviceA
GetDriveTypeA
CreateThread
CreateEventA
GetCommandLineA
GetModuleFileNameA
GetProcessHeap
InitializeCriticalSectionAndSpinCount
VirtualProtect
VirtualAlloc
GetSystemInfo
VirtualQuery
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStdHandle
VirtualFree
HeapReAlloc
GetModuleHandleA
GetLocaleInfoA
GetCPInfo
SetStdHandle
RtlUnwind
GetStringTypeA
GetStringTypeW
GetACP
GetOEMCP
HeapFree
DosDateTimeToFileTime
user32
SendDlgItemMessageA
DialogBoxParamA
MessageBoxA
SetParent
ShowWindow
SendMessageA
LoadStringA
EndDialog
ntdll
NtShutdownSystem
NtOpenProcessToken
NtClose
NtAdjustPrivilegesToken
comctl32
ord17
shell32
SHBrowseForFolderA
SHGetPathFromIDListA
Sections
.text Size: 111KB - Virtual size: 111KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 128.1MB - Virtual size: 128.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ