Static task
static1
Behavioral task
behavioral1
Sample
aeb27f05878cea96bb3fa7fc5152656a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
aeb27f05878cea96bb3fa7fc5152656a.exe
Resource
win10v2004-20231215-en
General
-
Target
aeb27f05878cea96bb3fa7fc5152656a
-
Size
29KB
-
MD5
aeb27f05878cea96bb3fa7fc5152656a
-
SHA1
bb58aa13992bb65607d2bf6cb7edf2d598c885f8
-
SHA256
1905ed6f2a1e5cbc8703d3fa2ad3ad5b387313ae53741929984a2a654d21271c
-
SHA512
9bf75097b1bb77cbd17a486fdd8254bad3af84ae704b8d70b8c3ab0db74da79a71a665daeb1df4fc9b17a30ceee4047876533b4ad4fa742b5e76bb303888716d
-
SSDEEP
768:xRlbr5uQAKGME4Z5T/4+31WDzKebbFJJQxmDGn:xRlbr8QAKT73CKebbx+mq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource aeb27f05878cea96bb3fa7fc5152656a
Files
-
aeb27f05878cea96bb3fa7fc5152656a.exe windows:1 windows x86 arch:x86
4ac80730349be130195c339ed75989e1
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
BuildCommDCBAndTimeoutsA
ClearCommError
DelayLoadFailureHook
ExitProcess
FindFirstVolumeMountPointW
GetAtomNameA
GetCompressedFileSizeA
GetCurrentProcess
GetLogicalDriveStringsA
GetModuleHandleA
GetNumberOfConsoleFonts
GetProfileIntW
GetSystemRegistryQuota
GetTempPathA
GetUserDefaultLangID
IsWow64Process
LocalShrink
VirtualQuery
WriteFileEx
user32
AnyPopup
AppendMenuW
ChangeDisplaySettingsExA
CharUpperBuffA
CreateDialogIndirectParamAorW
DefMDIChildProcW
DialogBoxParamA
DispatchMessageA
EditWndProc
EnterReaderModeHelper
EnumDisplayMonitors
EnumDisplaySettingsW
FlashWindow
GetAltTabInfoW
GetClassNameA
GetCursor
GetDC
GetDlgItemTextA
GetKeyboardLayout
GetNextDlgGroupItem
GetRawInputDeviceList
GetUpdateRgn
GetWindowRect
GetWindowTextLengthA
IMPSetIMEA
InSendMessageEx
InsertMenuItemW
IsCharAlphaA
KillTimer
OpenInputDesktop
PeekMessageA
ReasonCodeNeedsBugID
ScreenToClient
SendInput
SendMessageA
SetCapture
SetWindowRgn
SetWindowsHookA
ShowScrollBar
SubtractRect
TranslateMDISysAccel
UpdatePerUserSystemParameters
UserHandleGrantAccess
WaitForInputIdle
WinHelpA
gdi32
DdEntry42
EngTransparentBlt
FONTOBJ_pvTrueTypeFontFile
GdiSetAttrs
GdiValidateHandle
GetClipBox
SetDIBColorTable
ntdll
LdrFlushAlternateResourceModules
NtQueryVolumeInformationFile
RtlAbsoluteToSelfRelativeSD
RtlAddAccessDeniedObjectAce
RtlAllocateAndInitializeSid
RtlAreAnyAccessesGranted
RtlCreateUserProcess
RtlCreateUserThread
RtlDeNormalizeProcessParams
RtlExtendedIntegerMultiply
RtlExtendedMagicDivide
RtlFindClearRuns
RtlGetUnloadEventTrace
RtlIpv4AddressToStringExW
RtlNtStatusToDosError
RtlQueryInformationActiveActivationContext
RtlSecondsSince1980ToTime
RtlTimeToSecondsSince1970
RtlValidSid
ZwAddAtom
ZwCreateJobObject
ZwInitiatePowerAction
ZwQueryFullAttributesFile
ZwSignalAndWaitForSingleObject
ZwWaitForDebugEvent
ZwWaitForSingleObject
_i64toa
Sections
.tadhk Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.hyi Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.trf Size: 512B - Virtual size: 238B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rf Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ