Static task
static1
Behavioral task
behavioral1
Sample
a1ff1206764bfee944723aed2f0a7f863a2b9b3d7afe904417133015b9b2e0f5.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
a1ff1206764bfee944723aed2f0a7f863a2b9b3d7afe904417133015b9b2e0f5.exe
Resource
win10-20231020-en
General
-
Target
a1ff1206764bfee944723aed2f0a7f863a2b9b3d7afe904417133015b9b2e0f5
-
Size
263KB
-
MD5
88836cb61b947944f5913e3553fd2dbb
-
SHA1
a357ac41703c0f494bc5afbaaf5d91991f3f59d7
-
SHA256
a1ff1206764bfee944723aed2f0a7f863a2b9b3d7afe904417133015b9b2e0f5
-
SHA512
206a037f2086fb4d37e81e922d0d8f2df7ad84880d57a8c77d0bda9ba0b418d125d5f5de9d77afb2d61af9232dec650417ee85190496fbd326a8ef62a3e42904
-
SSDEEP
6144:mLYysjFGlJQljIz8BzMp5yXzQ5rRRgznyg3:E3lJmIzi9zO4ys
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a1ff1206764bfee944723aed2f0a7f863a2b9b3d7afe904417133015b9b2e0f5
Files
-
a1ff1206764bfee944723aed2f0a7f863a2b9b3d7afe904417133015b9b2e0f5.exe windows:5 windows x86
3be35b9fbdf783b05b0280d396415c6c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetPrivateProfileSectionNamesW
FindFirstFileW
FindVolumeClose
FindFirstChangeNotificationW
WriteConsoleInputW
GetConsoleAliasesLengthW
GetCPInfo
FindResourceExW
BuildCommDCBAndTimeoutsA
MapUserPhysicalPages
DeleteVolumeMountPointA
InterlockedIncrement
WaitNamedPipeA
SetDefaultCommConfigW
GetEnvironmentStringsW
GetModuleHandleExW
OpenSemaphoreA
SetTapeParameters
GetModuleHandleW
ConvertFiberToThread
ReadConsoleW
GetConsoleAliasExesW
EnumTimeFormatsA
GetCommandLineA
GetDriveTypeA
GetVolumePathNameW
GetEnvironmentStrings
AddRefActCtx
LoadLibraryW
FatalAppExitW
ReadConsoleInputA
GetSystemPowerStatus
CreateEventA
SetConsoleCP
GetFileAttributesA
GetExitCodeProcess
EnumSystemCodePagesA
SetConsoleMode
GetComputerNameA
GetCompressedFileSizeA
GetStartupInfoW
RaiseException
GetShortPathNameA
FindFirstFileA
GetLastError
SetLastError
PeekConsoleInputW
SetVolumeLabelW
HeapUnlock
MoveFileW
CopyFileA
EnumSystemCodePagesW
SetComputerNameA
VerLanguageNameW
GetTempFileNameA
FindClose
LocalAlloc
CreateHardLinkW
AddAtomW
RemoveDirectoryW
GetCommMask
FoldStringW
GetModuleHandleA
FindNextFileW
GetConsoleTitleW
VirtualProtect
GetCurrentDirectoryA
GetConsoleCursorInfo
QueryPerformanceFrequency
GetShortPathNameW
GetWindowsDirectoryW
GetVolumeNameForVolumeMountPointW
ReadConsoleOutputCharacterW
CommConfigDialogW
DeleteFileA
WriteConsoleW
FlushFileBuffers
SetStdHandle
ExitProcess
GetVolumeNameForVolumeMountPointA
ReadFile
GetSystemDefaultLangID
MoveFileA
WideCharToMultiByte
HeapAlloc
GetProcAddress
DecodePointer
HeapReAlloc
GetCommandLineW
HeapSetInformation
IsProcessorFeaturePresent
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
TerminateProcess
GetCurrentProcess
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
WriteFile
GetModuleFileNameW
HeapCreate
HeapFree
CloseHandle
FreeEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
SetFilePointer
GetConsoleCP
GetConsoleMode
RtlUnwind
LCMapStringW
MultiByteToWideChar
GetStringTypeW
HeapSize
CreateFileW
user32
CharUpperW
CharUpperBuffA
gdi32
GetTextFaceA
advapi32
AbortSystemShutdownA
shell32
DragAcceptFiles
Sections
.text Size: 224KB - Virtual size: 224KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 3.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.fip Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.naji Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ