g:\ojoapt\sdcdzktskk\shksmt
Static task
static1
Behavioral task
behavioral1
Sample
aa308c752462c2530f17c4666f418491.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
aa308c752462c2530f17c4666f418491.exe
Resource
win10v2004-20240226-en
General
-
Target
aa308c752462c2530f17c4666f418491
-
Size
612KB
-
MD5
aa308c752462c2530f17c4666f418491
-
SHA1
61ac1e009b6a89100fd618f5a922829088421d84
-
SHA256
e064050fa5c9a869df2e634f88457df647202b7149175f3f3d7f461d6a8b4abc
-
SHA512
54fb6af5b6a6662fd4a215cb0d8958b43af6bd44e47b22b5ef55e17de32bb870205a054cb829be0cd3bd6e60d2078f4ce56e451326fba71cd3ae0a828c913474
-
SSDEEP
12288:cwBUos1v3qfv3tXipN/H3ZE8sR9M+CfIgw7w3PK/r7D:gos1v6fv3tX+NfjYrKTw6PI7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource aa308c752462c2530f17c4666f418491
Files
-
aa308c752462c2530f17c4666f418491.exe windows:4 windows x86 arch:x86
bf29bce22be8d1c0c06a5019cee5c8d5
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
user32
GetDlgItemTextW
GetSystemMetrics
SetWinEventHook
DefMDIChildProcW
GetWindow
DestroyWindow
InsertMenuA
MapVirtualKeyExA
GetSysColor
InSendMessage
CreateWindowExW
GetMessageA
LoadCursorA
MsgWaitForMultipleObjectsEx
UnionRect
SetWindowContextHelpId
RegisterClassA
RegisterClassExA
IsIconic
GetClassInfoW
SetThreadDesktop
DlgDirSelectComboBoxExW
CreateIconFromResource
FlashWindow
ShowWindow
EmptyClipboard
DefWindowProcW
MessageBoxA
GetClassInfoA
shell32
DuplicateIcon
SHGetPathFromIDList
kernel32
SetEnvironmentVariableA
OpenWaitableTimerW
WriteFile
TlsFree
WaitCommEvent
VirtualQuery
GetCPInfo
HeapAlloc
GetCurrentThreadId
FreeEnvironmentStringsW
TlsGetValue
GetStartupInfoA
DeleteCriticalSection
GetFileType
CreateRemoteThread
MoveFileExA
HeapValidate
InterlockedExchange
GetCommandLineA
GetTickCount
LoadLibraryA
HeapCreate
GetAtomNameW
HeapReAlloc
GetVersionExA
CreateMutexA
GetCurrentProcess
IsValidCodePage
SetFileAttributesA
SetFilePointer
OpenFileMappingA
WideCharToMultiByte
RaiseException
GetSystemTimeAsFileTime
EnumSystemCodePagesW
GetOEMCP
EnterCriticalSection
GetStringTypeA
GlobalSize
TlsSetValue
ReleaseSemaphore
GetACP
CompareStringW
SetHandleCount
lstrcpynA
CompareStringA
SetThreadPriority
GetStringTypeW
GetModuleHandleA
VirtualFree
GetProcAddress
GetEnvironmentStringsW
HeapSize
ExitProcess
VirtualProtect
HeapDestroy
GetCurrentProcessId
GetTimeZoneInformation
ReadFile
GetModuleFileNameA
GetEnvironmentStrings
GetLastError
GetModuleFileNameW
TerminateProcess
LCMapStringA
GetFileAttributesW
FreeEnvironmentStringsA
LeaveCriticalSection
SetLastError
VirtualAlloc
AddAtomW
UnhandledExceptionFilter
GetUserDefaultLCID
GetProfileSectionA
GetTimeFormatA
RtlFillMemory
EnumDateFormatsExW
MultiByteToWideChar
GetLocaleInfoA
ReadConsoleW
IsBadWritePtr
SetEvent
GetCommandLineW
QueryPerformanceCounter
GetSystemInfo
GetDateFormatA
RtlUnwind
InitializeCriticalSection
TlsAlloc
CloseHandle
ReadFileEx
GetCurrentThread
WaitForDebugEvent
OpenMutexA
FlushFileBuffers
OpenMutexW
GetLocaleInfoW
FindResourceExA
GetStdHandle
LCMapStringW
HeapFree
GetStartupInfoW
IsValidLocale
EnumSystemLocalesA
SetStdHandle
comctl32
ImageList_EndDrag
ImageList_GetImageInfo
CreateStatusWindowW
ImageList_SetFlags
MakeDragList
ImageList_Remove
InitCommonControlsEx
CreateToolbarEx
ImageList_GetDragImage
Sections
.text Size: 176KB - Virtual size: 174KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 256KB - Virtual size: 255KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 112KB - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 64KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ