Static task
static1
Behavioral task
behavioral1
Sample
a1.exe
Resource
win10v2004-20231023-en
General
-
Target
a1.mentah
-
Size
191KB
-
MD5
f7b01c26880421d6e048a4d0b1b46f01
-
SHA1
3fe7d26403de73ff12226586217d0540e6ae5134
-
SHA256
54d19561553f3a8e84483e8f134baacf1098d3150cb2664dd3952cd50b8c8a07
-
SHA512
f8a363355efbfabe29cbaaf84834fb15846e85a8e7dc5705d53e3c20a1476fa4bbb65bd9915472f0c7d75b7a0a6d0b6399020880ed19f3ddb3d4eb78a6356bec
-
SSDEEP
3072:H9mtDqOjU907JTYMjRM6npmDBFdVNSu61U1aEr8R+kXEBGSk8qvv5bQrx:dcNjy2eghSguB0R5XEBG4q35Qr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a1.mentah
Files
-
a1.mentah.exe windows:5 windows x86 arch:x86
ed5f7302eabc150d65420ef1f379b500
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrlenA
HeapAlloc
SetConsoleTextAttribute
HeapFree
WaitForSingleObject
GetProcessHeap
CreateRemoteThread
WriteFile
OpenProcess
WideCharToMultiByte
GetVolumeInformationA
Sleep
GetConsoleWindow
CreateProcessA
TerminateProcess
SetConsoleTitleA
GetStdHandle
FindFirstFileA
GetProcAddress
CopyFileA
VirtualAllocEx
FindClose
FindNextFileA
GetFullPathNameA
IsDebuggerPresent
GetTempPathA
GetSystemTime
WriteProcessMemory
DeleteFileA
SetEnvironmentVariableA
CompareStringW
CreateFileW
GetExitCodeProcess
SetStdHandle
HeapReAlloc
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetStringTypeW
GetCurrentProcessId
GetTickCount
GetComputerNameA
ExitProcess
CloseHandle
GetLastError
GetCurrentProcess
QueryPerformanceCounter
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetModuleFileNameA
GetLocaleInfoW
LoadLibraryW
GetFileAttributesA
FlushFileBuffers
GetConsoleMode
SetEndOfFile
GetModuleHandleA
CreateFileA
GetConsoleCP
SetFilePointer
ReadFile
GetStartupInfoW
InitializeCriticalSectionAndSpinCount
InterlockedIncrement
InterlockedDecrement
InterlockedExchange
MultiByteToWideChar
EncodePointer
DecodePointer
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetSystemTimeAsFileTime
GetModuleHandleW
WriteConsoleW
GetFileType
GetModuleFileNameW
GetCommandLineA
HeapSetInformation
RaiseException
GetCPInfo
RtlUnwind
LCMapStringW
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsProcessorFeaturePresent
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
HeapSize
HeapCreate
SetHandleCount
user32
RegisterClassExA
SetWindowPos
MessageBoxA
LoadIconA
GetWindowRect
DestroyIcon
LoadCursorA
FindWindowA
DefWindowProcA
GetSystemMetrics
RegisterWindowMessageA
CreateWindowExA
advapi32
GetUserNameA
RegCloseKey
AdjustTokenPrivileges
OpenProcessToken
RegOpenKeyExA
LookupPrivilegeValueA
RegSetValueExA
shell32
Shell_NotifyIconA
ShellExecuteA
wininet
InternetCloseHandle
InternetOpenUrlA
InternetReadFile
InternetConnectW
HttpSendRequestW
HttpOpenRequestW
InternetOpenA
psapi
GetModuleBaseNameA
EnumProcessModules
EnumProcesses
urlmon
URLDownloadToFileA
Sections
.text Size: 139KB - Virtual size: 138KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 997KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ