Static task
static1
Behavioral task
behavioral1
Sample
a1.exe
Resource
win10v2004-20231025-en
General
-
Target
a1.mentah
-
Size
191KB
-
MD5
63c5e8390137d8ec71e7833a1424baa6
-
SHA1
8813ea879dc9b23cfb507fef81d9f5714ddfb4b6
-
SHA256
e06236e71f8fe5f8268a2035175b8afecb605364fd2efd6387db69c07a471048
-
SHA512
ebc2de29d2135487d2e020c4e054e5a15ed0afb00fcc4339c6a2d65c000ea9e7ad57ddedcb44eae91774b706d228a9d041ef8b82fde631bbdb57e00b6078f191
-
SSDEEP
3072:V9d01/0cCjZsRrJONxmq4ShDuJyV/MuP14veT6vRstYiKJdJvv5ba:lA0TjergB4f7um9RarAJ35
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a1.mentah
Files
-
a1.mentah.exe windows:5 windows x86
ed5f7302eabc150d65420ef1f379b500
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrlenA
HeapAlloc
SetConsoleTextAttribute
HeapFree
WaitForSingleObject
GetProcessHeap
CreateRemoteThread
WriteFile
OpenProcess
WideCharToMultiByte
GetVolumeInformationA
Sleep
GetConsoleWindow
CreateProcessA
TerminateProcess
SetConsoleTitleA
GetStdHandle
FindFirstFileA
GetProcAddress
CopyFileA
VirtualAllocEx
FindClose
FindNextFileA
GetFullPathNameA
IsDebuggerPresent
GetTempPathA
GetSystemTime
WriteProcessMemory
DeleteFileA
SetEnvironmentVariableA
CompareStringW
CreateFileW
GetExitCodeProcess
SetStdHandle
HeapReAlloc
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetStringTypeW
GetCurrentProcessId
GetTickCount
GetComputerNameA
ExitProcess
CloseHandle
GetLastError
GetCurrentProcess
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameA
GetLocaleInfoW
LoadLibraryW
GetFileAttributesA
FlushFileBuffers
GetConsoleMode
SetEndOfFile
GetModuleHandleA
CreateFileA
GetConsoleCP
SetFilePointer
ReadFile
GetStartupInfoW
InitializeCriticalSectionAndSpinCount
InterlockedIncrement
InterlockedDecrement
InterlockedExchange
MultiByteToWideChar
EncodePointer
DecodePointer
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetSystemTimeAsFileTime
GetModuleHandleW
WriteConsoleW
GetFileType
GetModuleFileNameW
GetCommandLineA
HeapSetInformation
RaiseException
GetCPInfo
RtlUnwind
LCMapStringW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
HeapSize
HeapCreate
SetHandleCount
user32
RegisterClassExA
SetWindowPos
MessageBoxA
LoadIconA
GetWindowRect
DestroyIcon
LoadCursorA
FindWindowA
DefWindowProcA
GetSystemMetrics
RegisterWindowMessageA
CreateWindowExA
advapi32
GetUserNameA
RegCloseKey
AdjustTokenPrivileges
OpenProcessToken
RegOpenKeyExA
LookupPrivilegeValueA
RegSetValueExA
shell32
Shell_NotifyIconA
ShellExecuteA
wininet
InternetCloseHandle
InternetOpenUrlA
InternetReadFile
InternetConnectW
HttpSendRequestW
HttpOpenRequestW
InternetOpenA
psapi
GetModuleBaseNameA
EnumProcessModules
EnumProcesses
urlmon
URLDownloadToFileA
Sections
.text Size: 139KB - Virtual size: 138KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 997KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ