Static task
static1
Behavioral task
behavioral1
Sample
aab6d6d9b9135280b209d964e70e0982bb286281dbc954763628d85298e92c45.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
aab6d6d9b9135280b209d964e70e0982bb286281dbc954763628d85298e92c45.exe
Resource
win10v2004-20230915-en
General
-
Target
aab6d6d9b9135280b209d964e70e0982bb286281dbc954763628d85298e92c45
-
Size
567KB
-
MD5
bf818575687a5071c554c6124b02486f
-
SHA1
fadcf9939c7863093a0384e68aae2d87885834b2
-
SHA256
aab6d6d9b9135280b209d964e70e0982bb286281dbc954763628d85298e92c45
-
SHA512
28ec76810e76ccd1dcef29b9076f7e5e87433da60e4a3e6d76a488439646f4cdc6916ec4771d1568f78bbab0f88f67c10c178c8de7cbdb139ca0299216b3677b
-
SSDEEP
12288:fGtlqs4VzM+LUwuyevOh+x6Bls+LtQMwxd0oA596qGewPyAp:fGtlqBVzM+5emh+YBls+5bwxaJ6qGmAp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource aab6d6d9b9135280b209d964e70e0982bb286281dbc954763628d85298e92c45
Files
-
aab6d6d9b9135280b209d964e70e0982bb286281dbc954763628d85298e92c45.exe windows:6 windows x64
6ac5899b078ea95dd5e40d26e7372b43
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
SetDllDirectoryW
MoveFileW
CopyFileW
FreeLibrary
SetThreadLocale
FindFirstFileExW
SetLastError
EnterCriticalSection
GetCurrentProcess
LeaveCriticalSection
InitializeCriticalSection
WaitForSingleObject
CreateFileW
GetSystemDirectoryW
GetLastError
GetUserDefaultLCID
LoadLibraryW
DeleteCriticalSection
GetCurrentProcessId
GetModuleHandleW
GetTickCount
GetStdHandle
WriteConsoleA
WriteFile
OutputDebugStringA
GetCurrentThreadId
AttachConsole
OutputDebugStringW
WriteConsoleW
GetFileType
ReadFile
GetFileSizeEx
SetFileTime
UnmapViewOfFile
GetFileAttributesExW
CreateFileMappingA
MoveFileExW
GetFileSize
MapViewOfFile
GetFileTime
VirtualProtect
GetTempPathW
Sleep
SetEvent
GetVersionExA
GetEnvironmentStringsW
MultiByteToWideChar
WideCharToMultiByte
CreateProcessW
RaiseException
GetSystemInfo
VirtualQuery
LoadLibraryExA
GetStringTypeW
CompareStringEx
InitializeCriticalSectionEx
EncodePointer
DecodePointer
LCMapStringEx
GetCPInfo
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
InitializeCriticalSectionAndSpinCount
ResetEvent
WaitForSingleObjectEx
CreateEventW
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
RtlUnwindEx
RtlPcToFileHeader
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
LoadLibraryExW
GetModuleHandleExW
HeapFree
HeapAlloc
HeapReAlloc
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
LCMapStringW
GetLocaleInfoW
IsValidLocale
EnumSystemLocalesW
IsValidCodePage
GetACP
GetOEMCP
GetCommandLineA
FreeEnvironmentStringsW
SetStdHandle
GetProcessHeap
SetFilePointerEx
FlushFileBuffers
GetConsoleOutputCP
GetConsoleMode
HeapSize
ReadConsoleW
SetEndOfFile
GetEnvironmentVariableW
GetProcAddress
SetCurrentDirectoryW
GetCurrentDirectoryW
CloseHandle
DeleteFileW
GetFileAttributesW
FindClose
GetModuleFileNameW
RemoveDirectoryW
FindNextFileW
GetFullPathNameW
GetCommandLineW
FindFirstFileW
ExitProcess
CreateDirectoryW
Sections
.text Size: 392KB - Virtual size: 392KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 124KB - Virtual size: 124KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 512B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ