Static task
static1
Behavioral task
behavioral1
Sample
5aa57140556a8d45b43002aba104b932.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5aa57140556a8d45b43002aba104b932.exe
Resource
win10v2004-20231215-en
General
-
Target
5aa57140556a8d45b43002aba104b932
-
Size
320KB
-
MD5
5aa57140556a8d45b43002aba104b932
-
SHA1
904a27de1568eeaf8d97d686cfbacd26a2157f61
-
SHA256
547e6e67e28b7f1076fb07e22f27692922cc0c5ca5413fe9a46282049edecfd1
-
SHA512
79ceb5529a3c2b724446a69db66938fefc031e63d9daacea233fdac43d138b90bbc431ac62ae48eebfb6671e0d6f3d118c9a4a673540e471e11e78c0a9ef6545
-
SSDEEP
3072:GXNRgaB5c6KTy2kLOR1+o0W152aDIUwmwyUvwqVsPHTw:oB2tm2kLwoo0WOaDIUwZyF3fE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5aa57140556a8d45b43002aba104b932
Files
-
5aa57140556a8d45b43002aba104b932.exe windows:5 windows x86 arch:x86
92df55fa79e754888d3e5d7c1bbd58fa
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedDecrement
GetCurrentProcess
WaitForSingleObject
SetEvent
SleepEx
GetTickCount
WriteFile
FindActCtxSectionStringA
FindResourceExA
GetConsoleCP
SetFileShortNameW
FreeConsole
GetFileAttributesA
ReadFile
ReleaseSemaphore
SetConsoleTitleA
GetProcAddress
HeapUnlock
ReadFileEx
ResetEvent
LoadLibraryA
LocalAlloc
GetModuleFileNameA
GetConsoleTitleW
DeleteCriticalSection
EndUpdateResourceA
GetPrivateProfileSectionW
CommConfigDialogW
HeapAlloc
lstrlenW
LocalUnlock
GetStartupInfoW
RaiseException
RtlUnwind
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetLastError
HeapFree
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
SetFilePointer
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
Sleep
ExitProcess
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
HeapCreate
VirtualFree
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
VirtualAlloc
HeapReAlloc
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
MultiByteToWideChar
WideCharToMultiByte
CloseHandle
CreateFileA
InitializeCriticalSectionAndSpinCount
SetStdHandle
HeapSize
GetConsoleMode
FlushFileBuffers
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
SetEndOfFile
GetProcessHeap
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
gdi32
GetCharWidthFloatW
advapi32
ReportEventW
Sections
.text Size: 83KB - Virtual size: 83KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 188KB - Virtual size: 8.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.wup Size: 1024B - Virtual size: 626B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.xojoheh Size: 512B - Virtual size: 23B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.liy Size: 512B - Virtual size: 6B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.hujiv Size: 1024B - Virtual size: 963B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 45KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ