Static task
static1
Behavioral task
behavioral1
Sample
aa13e08180f12af5ee1c22e55d75a9b4.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
aa13e08180f12af5ee1c22e55d75a9b4.exe
Resource
win10v2004-20240226-en
General
-
Target
aa13e08180f12af5ee1c22e55d75a9b4
-
Size
285KB
-
MD5
aa13e08180f12af5ee1c22e55d75a9b4
-
SHA1
65ed26bb9ae8fc2612f33ed4110d1ed350586687
-
SHA256
121ee9a48cb365446f9ad6242b34f8982e5e8ed1e63c204328a76d43c43881dd
-
SHA512
928d1aa502f6e09377ac606017700e3409314326f860ced875dcd6b0db09f43aec35266e42e2d2b86a112290d71617ffa29bdf296a73dbc0d452a39bcc39d67b
-
SSDEEP
3072:/VYcdLtlGon6h/kxBsqLOp6YJG+mW4mn6Z2mSPyDaQIRqIJDyEw/Qd9433n1rNdt:CWBRxSp6Ytv4mI2mSK+QIBNyd/Qd9FTC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource aa13e08180f12af5ee1c22e55d75a9b4
Files
-
aa13e08180f12af5ee1c22e55d75a9b4.exe windows:5 windows x86 arch:x86
e150a0f4166b7e820bdcca54966771c2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetWindowsDirectoryA
WriteFile
GlobalAlloc
Sleep
CreateEventA
TransactNamedPipe
VerifyVersionInfoA
FileTimeToSystemTime
GetMailslotInfo
ReadFile
GetSystemDirectoryA
CreateDirectoryA
GetLastError
WaitNamedPipeA
GlobalFree
LoadLibraryA
GetSystemInfo
SetNamedPipeHandleState
SetEnvironmentVariableA
GetModuleFileNameA
CreateMailslotA
GetFileTime
CloseHandle
FindResourceA
LoadResource
SizeofResource
LockResource
VerSetConditionMask
SystemTimeToTzSpecificLocalTime
FreeLibrary
lstrlenA
CreateFileA
GetProcAddress
GetComputerNameA
SetEndOfFile
CreateFileW
FlushFileBuffers
WriteConsoleW
SetStdHandle
OutputDebugStringW
EncodePointer
DecodePointer
IsDebuggerPresent
IsProcessorFeaturePresent
GetCommandLineA
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
SetLastError
GetCurrentThreadId
MultiByteToWideChar
ExitProcess
GetModuleHandleExW
AreFileApisANSI
WideCharToMultiByte
HeapSize
EnterCriticalSection
LeaveCriticalSection
HeapFree
UnhandledExceptionFilter
SetUnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
GetCurrentProcess
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetStartupInfoW
GetModuleHandleW
RaiseException
HeapAlloc
GetProcessHeap
GetStdHandle
GetFileType
DeleteCriticalSection
GetModuleFileNameW
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
RtlUnwind
GetConsoleCP
GetConsoleMode
GetStringTypeW
LCMapStringW
LoadLibraryExW
HeapReAlloc
SetFilePointerEx
ReadConsoleW
advapi32
RegEnumValueA
RegQueryInfoKeyA
RegOpenKeyExA
RegEnumKeyExA
RegDeleteKeyA
RegCloseKey
shell32
SHFileOperationA
rpcrt4
UuidCreate
UuidToStringA
RpcStringFreeA
Sections
.text Size: 76KB - Virtual size: 75KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 138KB - Virtual size: 138KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ