Static task
static1
Behavioral task
behavioral1
Sample
5aa36b0be45e3606a5e6743697007b7f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5aa36b0be45e3606a5e6743697007b7f.exe
Resource
win10v2004-20231215-en
General
-
Target
5aa36b0be45e3606a5e6743697007b7f
-
Size
23KB
-
MD5
5aa36b0be45e3606a5e6743697007b7f
-
SHA1
3b512db002db1fa8880a8f0fb2519c4960e372b3
-
SHA256
33cdccbb8b6f65f6b13c7692ae37a66651ffafb8948da77aaec9c52d2847a798
-
SHA512
43f84becf6c211ad11e6353a2885c28cf1b35f5d5821ee378b23df52692ebcfb88941e3adfcfed8a4519395af2baca68734efc07bf238e89ead3499f64ff0112
-
SSDEEP
384:pADwlfIhV44GZMU5gzddG00VzPrY46VjtZOC6t6gu3/+zK0A4t5JPs2zRGNp6iM0:pAtUg+00VOXy6V3/+zKiOnlA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5aa36b0be45e3606a5e6743697007b7f
Files
-
5aa36b0be45e3606a5e6743697007b7f.exe windows:5 windows x86 arch:x86
8de6c10e52417e4124a3b7f3b2a29ce4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryExW
Sleep
SizeofResource
GetPrivateProfileStringW
lstrlenW
CreateDirectoryW
GetSystemInfo
ExpandEnvironmentStringsW
LoadLibraryW
GetEnvironmentVariableW
GetPrivateProfileIntW
lstrcmpiW
GetDiskFreeSpaceW
GetFullPathNameW
GetTempFileNameW
RemoveDirectoryW
MoveFileW
LockResource
FindClose
UnmapViewOfFile
SearchPathW
FreeLibrary
UnhandledExceptionFilter
MapViewOfFile
FindFirstFileW
LocalFree
GetFileTime
TerminateProcess
FreeConsole
GetSystemTimeAsFileTime
FormatMessageW
lstrcmpW
WideCharToMultiByte
GetModuleFileNameW
MulDiv
DisableThreadLibraryCalls
InterlockedExchange
GetProcessHeap
SetFilePointer
CreateFileW
GetProfileStringW
QueryPerformanceCounter
lstrcmpiA
GetFileAttributesW
WritePrivateProfileStringW
HeapAlloc
FindResourceExW
ReadFile
GetLocalTime
GetVersionExW
CreateFileMappingW
GetTempPathW
DeleteFileW
GetWindowsDirectoryW
GetCurrentThreadId
FindResourceW
RtlUnwind
GetShortPathNameW
GetCurrentProcess
lstrlenA
FindNextFileW
GetPrivateProfileSectionW
MoveFileExW
EnumResourceLanguagesW
GetVolumeInformationW
CompareStringW
MultiByteToWideChar
GetLastError
GetSystemDirectoryW
GetTickCount
CopyFileW
GetFileSize
GetCurrentProcessId
GetDriveTypeW
SetFileTime
GetUserDefaultUILanguage
SetLastError
LocalAlloc
GetLocaleInfoW
InterlockedCompareExchange
CreateProcessW
VirtualAlloc
WritePrivateProfileSectionW
SetFileAttributesW
SetUnhandledExceptionFilter
WriteFile
MapViewOfFileEx
LoadResource
LocalReAlloc
CloseHandle
GetSystemDefaultUILanguage
gdi32
GetStockObject
CreateFontIndirectW
GetObjectW
DeleteObject
GetDeviceCaps
crypt32
CryptFormatObject
msvcrt
malloc
_adjust_fdiv
memset
_wtol
bsearch
_ultow
_XcptFilter
_initterm
memcpy
wcsncmp
memmove
_amsg_exit
_wcsicmp
_vsnwprintf
_wcsnicmp
_setjmp3
longjmp
_vsnprintf
free
_wtoi
user32
MsgWaitForMultipleObjects
GetSystemMetrics
IsWindow
LoadStringW
CharNextA
DialogBoxParamW
MessageBoxW
DispatchMessageW
SetWindowTextW
SendMessageW
ReleaseDC
GetDlgItem
UpdateWindow
PeekMessageW
CharNextW
CharPrevW
CreateDialogParamW
GetDC
SendDlgItemMessageW
GetWindowRect
SetWindowPos
GetDlgItemTextW
OemToCharA
DestroyWindow
MessageBeep
CharUpperW
EndDialog
GetDesktopWindow
ExitWindowsEx
ShowWindow
SetDlgItemTextW
EnableWindow
usp10
ScriptGetFontProperties
Sections
.rdata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 512B - Virtual size: 440B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ