Static task
static1
Behavioral task
behavioral1
Sample
a11106ff1c8f87d862d3959aedcfc811.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a11106ff1c8f87d862d3959aedcfc811.exe
Resource
win10v2004-20240221-en
General
-
Target
a11106ff1c8f87d862d3959aedcfc811
-
Size
396KB
-
MD5
a11106ff1c8f87d862d3959aedcfc811
-
SHA1
9ce5462850e1b6e6056b02b1d8932b2d42a60894
-
SHA256
20706903a7befc76e6f7d13f24646b43641434e48c4925139f063faf6dcca0b6
-
SHA512
e590554b27157bbca9b7d38c4093dcfdaf25b52ac57ee192b33da381c66e810d51384e6ca166b6d2bda44a01c845c67ab9b1efe887d494997961c7868770b3b8
-
SSDEEP
6144:axYjDF8qaOV7H1a/qtClhJcTA8L6yonFdqOmLHQIjKBTVIFRAqtes3WYz:aSjB8BYLcqt2JO6nOONBBTVwAC9z
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a11106ff1c8f87d862d3959aedcfc811
Files
-
a11106ff1c8f87d862d3959aedcfc811.exe windows:4 windows x86 arch:x86
467fe8a95e9c9063a8dc79b032d7938b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateEventA
VirtualFree
GetModuleHandleA
GetTickCount
SizeofResource
UpdateResourceA
CloseHandle
ReadFile
CreateFileA
FreeResource
LockResource
LoadResource
FindResourceExA
VirtualProtect
GetModuleHandleW
GetProcAddress
LocalAlloc
GlobalFree
WriteFile
GlobalAlloc
UnlockFile
LockFile
SetFilePointer
LoadLibraryA
SystemTimeToFileTime
GetSystemTime
FindClose
FindNextFileA
EndUpdateResourceA
BeginUpdateResourceA
VirtualQuery
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
GetOEMCP
GetACP
GetCPInfo
HeapReAlloc
RtlUnwind
HeapCreate
HeapDestroy
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetStringTypeW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetModuleFileNameA
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
HeapFree
HeapAlloc
GetVersion
GetCommandLineA
GetStartupInfoA
VirtualFreeEx
FreeLibrary
VirtualAlloc
CreateSemaphoreA
LoadLibraryW
VirtualAllocEx
Sleep
GetTempPathA
ExitProcess
GetLastError
GetCurrentDirectoryA
SetCurrentDirectoryA
user32
TranslateMessage
DispatchMessageA
GetDesktopWindow
IsWindow
IsWindowVisible
SetWindowRgn
DestroyIcon
CopyImage
CreateIconIndirect
EndDialog
DialogBoxParamA
DestroyWindow
DefWindowProcA
BeginPaint
GetClientRect
DrawTextA
PostQuitMessage
CreateWindowExA
ShowWindow
UpdateWindow
LoadIconA
LoadCursorA
RegisterClassExA
LoadStringA
LoadAcceleratorsA
GetMessageA
TranslateAcceleratorA
DrawIcon
HideCaret
GetDC
ReleaseDC
ShowCaret
EndPaint
gdi32
GetObjectA
CreatePen
CreateSolidBrush
SelectObject
Rectangle
DeleteObject
GetCharWidth32A
TextOutA
GetDIBits
CreateCompatibleBitmap
GetDeviceCaps
EnumObjects
Sections
.text Size: 180KB - Virtual size: 177KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 72KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.dbg Size: 116KB - Virtual size: 488KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ssl Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE