Static task
static1
Behavioral task
behavioral1
Sample
aea5988e0350324004e8227603ba2e26ddcccc4b80ee93285ffebe0c0cfb26aa.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
aea5988e0350324004e8227603ba2e26ddcccc4b80ee93285ffebe0c0cfb26aa.exe
Resource
win10v2004-20231020-en
General
-
Target
aea5988e0350324004e8227603ba2e26ddcccc4b80ee93285ffebe0c0cfb26aa
-
Size
142KB
-
MD5
aea0e79a5a17e0d2dbd7a2f48a55950f
-
SHA1
f5007916401ae7cffcfe8de20844fa7926e56703
-
SHA256
aea5988e0350324004e8227603ba2e26ddcccc4b80ee93285ffebe0c0cfb26aa
-
SHA512
2b66f12b10107cbc367a857e3d24f6a9288cb5cb2aa5be53b3b97b0448561c3885ef630fff6c37b64d4fa20df70361e963c83a2e7a11268b71f80349b8f3ba1b
-
SSDEEP
3072:5zlpiPz2XQziVkpeAlYn9j/W+XOrSpE825S:RtbGB4pra
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource aea5988e0350324004e8227603ba2e26ddcccc4b80ee93285ffebe0c0cfb26aa
Files
-
aea5988e0350324004e8227603ba2e26ddcccc4b80ee93285ffebe0c0cfb26aa.exe windows:6 windows x86
b5f9918087e25e6aeeb04d55acaf6a26
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DecodePointer
GetSystemInfo
DeleteCriticalSection
GetCurrentThreadId
CloseHandle
DeleteFileW
LocalFree
SetFileAttributesW
lstrcpyW
Sleep
WritePrivateProfileStringW
FlushInstructionCache
SetLastError
GlobalReAlloc
GlobalFree
FlushFileBuffers
WriteConsoleW
SetStdHandle
SetFilePointerEx
GetConsoleMode
GetConsoleCP
LoadLibraryExW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
QueryPerformanceCounter
GetModuleFileNameA
GetStdHandle
GetModuleHandleExW
ExitProcess
GetOEMCP
GetACP
IsValidCodePage
LCMapStringW
EnterCriticalSection
HeapSize
GetProcAddress
GetLastError
VerifyVersionInfoW
RaiseException
GlobalUnlock
lstrlenW
InitializeCriticalSectionEx
MultiByteToWideChar
CreateFileW
GetModuleFileNameW
MulDiv
LeaveCriticalSection
LoadLibraryW
GlobalAlloc
HeapReAlloc
WriteFile
GetProcessHeap
GetModuleHandleW
GlobalLock
CreateDirectoryW
HeapFree
GetCurrentProcess
MoveFileExW
VerSetConditionMask
HeapAlloc
FreeLibrary
GetStartupInfoW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
TerminateProcess
InitializeCriticalSectionAndSpinCount
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
RtlUnwind
GetCommandLineA
GetSystemTimeAsFileTime
EncodePointer
GetStringTypeW
WideCharToMultiByte
VirtualFree
VirtualAlloc
IsProcessorFeaturePresent
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
OutputDebugStringW
IsDebuggerPresent
GetFileType
user32
ReleaseDC
GetDesktopWindow
CreateWindowExW
MessageBoxW
SendMessageW
PostMessageW
DialogBoxIndirectParamW
FindWindowW
LoadIconW
GetDlgItem
SetWindowLongW
EndDialog
SendDlgItemMessageW
ShowWindow
GetActiveWindow
EnableWindow
GetDlgCtrlID
MapDialogRect
UnregisterClassW
SetForegroundWindow
wsprintfW
GetDC
gdi32
SetBkColor
DeleteObject
CreateSolidBrush
CreateFontIndirectW
GetDeviceCaps
GetObjectW
SetTextColor
advapi32
RegCloseKey
RegCreateKeyExW
ControlService
RegDeleteTreeW
QueryServiceStatus
StartServiceW
OpenServiceW
OpenSCManagerW
DeleteService
CloseServiceHandle
CreateServiceW
RegSetValueExW
RegOpenKeyExW
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegDeleteKeyW
RegQueryValueExW
shell32
ord75
SHGetSpecialFolderPathW
SHFileOperationW
SHChangeNotify
Shell_NotifyIconW
ole32
CoCreateInstance
CoInitializeEx
CoTaskMemFree
CLSIDFromString
CoUninitialize
shlwapi
PathAppendW
PathFileExistsW
PathFindFileNameW
PathRemoveFileSpecW
comctl32
ord17
Sections
.text Size: 72KB - Virtual size: 71KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ