Static task
static1
Behavioral task
behavioral1
Sample
a8ae05588f452eae6eabbe4777b257a5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
a8ae05588f452eae6eabbe4777b257a5.exe
Resource
win10v2004-20231222-en
General
-
Target
a8ae05588f452eae6eabbe4777b257a5.exe
-
Size
15KB
-
MD5
a8ae05588f452eae6eabbe4777b257a5
-
SHA1
323db6a149f8bdc1cb3c198e0c5b5d12d198ef3b
-
SHA256
c6ecd99e0cbef0c2229118a95941ae6413587204df2fb2496c7595a4d10cb06b
-
SHA512
dded19ee0331b3911337e44f16597055b24baeba48a8bb29b12f8d453330b608acfa2dd714ba09cd1e42a5ddf9f3577aee6e14cf8f6d0e22cf026bb47cbda065
-
SSDEEP
192:XT3ytdvCgQYkVCeO00Svu/iseaVPVGoFPNEadN6kKOenUoynxk9iEgn:XTIKgUXvu/i5YQoFPLUkKOZbkYX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a8ae05588f452eae6eabbe4777b257a5.exe
Files
-
a8ae05588f452eae6eabbe4777b257a5.exe.exe windows:4 windows x86 arch:x86
c0998087e3bfdd448bca4634d9b2a233
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord825
ord1158
ord860
ord535
ord858
ord823
ord540
ord2846
ord2818
ord537
ord2764
ord6648
ord4129
ord800
ord2915
msvcrt
_controlfp
_except_handler3
__set_app_type
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
_XcptFilter
_exit
malloc
sprintf
__CxxFrameHandler
strncmp
rand
srand
time
printf
atoi
strstr
strchr
exit
_strcmpi
kernel32
ResumeThread
Sleep
GetProcessHeap
CreateProcessA
GetTickCount
GetCurrentProcessId
ExitThread
GetModuleFileNameA
SetThreadPriority
GetCurrentThread
SetPriorityClass
GetCurrentProcess
lstrcatA
lstrcpyA
HeapAlloc
GetShortPathNameA
GetStartupInfoA
GetModuleHandleA
GetProcAddress
OpenProcess
VirtualAllocEx
WriteProcessMemory
CreateRemoteThread
CreateToolhelp32Snapshot
Process32First
Process32Next
GetWindowsDirectoryA
CopyFileA
GetVersionExA
GlobalMemoryStatus
CreateThread
GetSystemDirectoryA
WinExec
GetEnvironmentVariableA
user32
wsprintfA
comdlg32
GetFileTitleA
advapi32
RegCloseKey
RegOpenKeyExA
RegSetValueExA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegQueryValueExA
shell32
ShellExecuteA
ws2_32
htons
inet_addr
sendto
setsockopt
WSASocketA
WSAStartup
htonl
connect
socket
send
inet_ntoa
gethostbyname
closesocket
WSAGetLastError
recv
__WSAFDIsSet
select
iphlpapi
GetAdaptersInfo
SendARP
urlmon
URLDownloadToFileA
Sections
.text Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 242KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE