Static task
static1
Behavioral task
behavioral1
Sample
ae0aae99b2c38edd2214d8e3cda7c1ee6a609f4cd48cee10662c662cbca084dd.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
ae0aae99b2c38edd2214d8e3cda7c1ee6a609f4cd48cee10662c662cbca084dd.exe
Resource
win10v2004-20231023-en
General
-
Target
ae0aae99b2c38edd2214d8e3cda7c1ee6a609f4cd48cee10662c662cbca084dd
-
Size
3.2MB
-
MD5
074ba5e9ea952c61d6cc33ab7eb472ad
-
SHA1
e8472d94fddcb8574e46fd09253f3ed6e5c249a6
-
SHA256
ae0aae99b2c38edd2214d8e3cda7c1ee6a609f4cd48cee10662c662cbca084dd
-
SHA512
4a61cb202f1223240b255bee66d1cfb1ceed1080b2e78ac73f6b43c9207c39959c9a63c71ac37cf76e6048e028e4b024be36361effa5b22883e2690fe57a33ae
-
SSDEEP
98304:mjaVXRCSXaONmtF739AB85qelyL92S10:1Vt+75Eelyh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ae0aae99b2c38edd2214d8e3cda7c1ee6a609f4cd48cee10662c662cbca084dd
Files
-
ae0aae99b2c38edd2214d8e3cda7c1ee6a609f4cd48cee10662c662cbca084dd.exe windows:5 windows x86 arch:x86
06de25b65d37e74034434da43f531c7e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
GetProcAddress
CreateFileW
SetStdHandle
WriteConsoleW
CloseHandle
SetFilePointer
FlushFileBuffers
GetCommandLineA
HeapSetInformation
RaiseException
SetUnhandledExceptionFilter
GetModuleHandleW
ExitProcess
DecodePointer
WriteFile
GetStdHandle
GetModuleFileNameW
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
GetStartupInfoW
DeleteCriticalSection
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
GetLastError
InterlockedDecrement
HeapCreate
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
HeapFree
IsProcessorFeaturePresent
EnterCriticalSection
LeaveCriticalSection
LoadLibraryW
Sleep
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
RtlUnwind
HeapSize
HeapReAlloc
LCMapStringW
MultiByteToWideChar
GetStringTypeW
GetConsoleCP
GetConsoleMode
LocalAlloc
LocalFree
GetModuleFileNameW
GetProcessAffinityMask
SetProcessAffinityMask
SetThreadAffinityMask
Sleep
ExitProcess
FreeLibrary
LoadLibraryA
GetModuleHandleA
GetProcAddress
ws2_32
recv
closesocket
connect
inet_addr
htons
WSACleanup
socket
WSAStartup
user32
GetProcessWindowStation
GetUserObjectInformationW
Sections
.text Size: - Virtual size: 37KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ERRE0 Size: - Virtual size: 1.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.ERRE1 Size: 3.2MB - Virtual size: 3.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 6KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ