Static task
static1
Behavioral task
behavioral1
Sample
a0e07a34b56398ac966a359033db5f37.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a0e07a34b56398ac966a359033db5f37.exe
Resource
win10v2004-20240221-en
General
-
Target
a0e07a34b56398ac966a359033db5f37
-
Size
41KB
-
MD5
a0e07a34b56398ac966a359033db5f37
-
SHA1
c421afb00e83b4b1de0b8f4f6b213f66cf8804fc
-
SHA256
1aa5dd573da287dba38d498a6964da329f520a572c72d420c76a00fd640ed236
-
SHA512
8c18fcf65c84d8406f363b8f674d42b8792099f9f8bb3e1b687c9360b59bfd3ea32ddbac8196df638fda7a0aecb56777004da69c1e126ae74bea33730eb95146
-
SSDEEP
768:FMDJgZLJOv+LJIENNKOTRDZ2a1bt8hBFM5ZaZ:WeVkv+9xbTRDMM3y
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a0e07a34b56398ac966a359033db5f37
Files
-
a0e07a34b56398ac966a359033db5f37.exe windows:5 windows x86 arch:x86
a1adb0844877d6d25a821edcad15ef99
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcmpW
FoldStringW
GetCurrentProcessId
GetCommandLineW
MulDiv
GetFullPathNameW
LocalSize
GetLastError
WriteFile
SetLastError
FindFirstFileW
SetEndOfFile
DeleteFileW
GetACP
GetDateFormatW
GetTimeFormatW
GlobalLock
GlobalUnlock
GlobalAlloc
LoadLibraryA
VirtualProtect
FindClose
HeapSetInformation
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetModuleHandleA
VirtualAlloc
HeapAlloc
WideCharToMultiByte
GetProcAddress
user32
SetCursor
SetWindowPos
GetWindowTextW
CreateDialogParamW
DialogBoxParamW
EnableWindow
FindWindowW
GetSystemMetrics
MoveWindow
SendMessageW
CharNextW
CheckMenuItem
CloseClipboard
IsClipboardFormatAvailable
OpenClipboard
GetMenuState
EnableMenuItem
SetForegroundWindow
advapi32
OpenServiceW
QueryServiceConfigW
CloseServiceHandle
IsTextUnicode
RegOpenKeyExW
RegCreateKeyW
RegCloseKey
RegQueryValueExW
RegSetValueExW
RegOpenKeyA
OpenSCManagerW
Sections
.text Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 578B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ