Static task
static1
Behavioral task
behavioral1
Sample
ae84051c3e1b3ea676529503c0148c2a13a50f5dda4d09f24fa8f4b6b5f491e8.exe
Resource
win7-20231215-en
General
-
Target
ae84051c3e1b3ea676529503c0148c2a13a50f5dda4d09f24fa8f4b6b5f491e8
-
Size
244KB
-
MD5
7b2fbef21699a84ac64d029c62178963
-
SHA1
4bae657c928bead1ae75fcd1c4c81c4b1e113acf
-
SHA256
ae84051c3e1b3ea676529503c0148c2a13a50f5dda4d09f24fa8f4b6b5f491e8
-
SHA512
1a6ad3fed609c37556b0707c369a7d8aa2ea77bfc06fbbed7d9f2c4195a9a2e7c2c563040b63f374f3c36313b14ff4a5e1880d60265f4bef9d97fa4b8ff25412
-
SSDEEP
3072:txu8YiWo8uQ4SU/1GhiE5O7nyJb+lAQz2/OIu+6I7aWJu5HVFUjWjJtp:txu8HRl/1GJO7fZJI+5HYjWj9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ae84051c3e1b3ea676529503c0148c2a13a50f5dda4d09f24fa8f4b6b5f491e8
Files
-
ae84051c3e1b3ea676529503c0148c2a13a50f5dda4d09f24fa8f4b6b5f491e8.exe windows:5 windows x86 arch:x86
4dcf0786e9c95a11a0ec45176eff4aa8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetLocaleInfoA
WriteConsoleOutputCharacterW
SystemTimeToTzSpecificLocalTime
SystemTimeToFileTime
OpenJobObjectA
GetComputerNameW
FreeEnvironmentStringsA
GetModuleHandleW
GetTickCount
GetConsoleAliasesA
WriteFile
LoadLibraryW
WriteConsoleOutputA
HeapDestroy
GetTimeZoneInformation
ReplaceFileA
FlushFileBuffers
CreateDirectoryA
SetCurrentDirectoryA
GetLastError
GetCurrentDirectoryW
GetProcAddress
CreateNamedPipeA
ResetEvent
LoadLibraryA
GetProcessWorkingSetSize
LocalAlloc
AddAtomW
VirtualProtect
EnumDateFormatsW
CompareStringA
FatalAppExitA
EnumSystemLocalesA
GetLocaleInfoA
GetCommandLineA
HeapSetInformation
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapAlloc
ExitProcess
DecodePointer
GetStdHandle
GetModuleFileNameW
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
EncodePointer
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
GetCurrentThread
HeapCreate
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
LeaveCriticalSection
EnterCriticalSection
SetConsoleCtrlHandler
FreeLibrary
InterlockedExchange
GetLocaleInfoW
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapFree
Sleep
RtlUnwind
HeapSize
LCMapStringW
MultiByteToWideChar
GetStringTypeW
HeapReAlloc
IsProcessorFeaturePresent
RaiseException
GetUserDefaultLCID
IsValidLocale
user32
GetClassLongA
Sections
.text Size: 136KB - Virtual size: 136KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 39.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.dojit Size: 512B - Virtual size: 124B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.juneg Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.yiy Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 82KB - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ