Static task
static1
Behavioral task
behavioral1
Sample
aaa34e2a1d819c76a30e266a2cfddc93.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
aaa34e2a1d819c76a30e266a2cfddc93.exe
Resource
win10v2004-20240226-en
General
-
Target
aaa34e2a1d819c76a30e266a2cfddc93
-
Size
49KB
-
MD5
aaa34e2a1d819c76a30e266a2cfddc93
-
SHA1
890e49dd8d7075cd6e62af6374a0acbce61ba6dd
-
SHA256
5bce9579e964b5bacc7f0455b427894bf0c9172ab65c665070bfe8a8cf3ef706
-
SHA512
10aa10e3f89789d5380e74c0aa05883fe431e6eec356b6e98fbf7ba6fa3c7a63677486fe835a2056ff8d4a223d24cf1fcbcefd04bf259e5a7efc5244667cb236
-
SSDEEP
768:LfnEmwduHlbGeDOstzvB51HXraiZ1c4nk7CGX0ohc8pwVAI2cgtZrwSP1WuXdtk:DnEmwduHlbxDBPFrffnk71/qAI2fx1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource aaa34e2a1d819c76a30e266a2cfddc93
Files
-
aaa34e2a1d819c76a30e266a2cfddc93.exe windows:5 windows x86 arch:x86
3bdc4a92017cb65a2541e5c404e18b01
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
GetIconInfo
MsgWaitForMultipleObjects
EndDialog
ToUnicode
GetWindowTextW
SetThreadDesktop
GetClipboardData
GetMessageA
GetKeyState
CloseWindowStation
PeekMessageA
GetClassNameW
OpenWindowStationA
DispatchMessageW
SendMessageW
GetCursorPos
GetForegroundWindow
DrawIcon
OpenDesktopA
LoadCursorW
ExitWindowsEx
GetWindowLongW
CharLowerBuffA
SetProcessWindowStation
GetDlgItemTextA
GetDlgItem
GetDlgItemTextW
GetWindowThreadProcessId
PeekMessageW
FindWindowExW
CloseDesktop
GetMessageW
GetKeyboardState
kernel32
GetSystemTimeAsFileTime
GetTempFileNameW
SetFileTime
ResetEvent
CreateMutexW
FlushFileBuffers
ExpandEnvironmentStringsW
CreateThread
GetExitCodeProcess
IsBadReadPtr
GetDriveTypeW
EnterCriticalSection
lstrcpynW
GetVersionExW
lstrcatA
GetUserDefaultUILanguage
SetFileAttributesW
InitializeCriticalSection
lstrcpyA
GetModuleFileNameA
WriteFile
GetCurrentThreadId
WideCharToMultiByte
lstrcmpiA
GetSystemTime
MapViewOfFile
WriteProcessMemory
SetEvent
lstrlenW
CreateDirectoryW
SystemTimeToFileTime
SetLastError
GetComputerNameW
GetTimeZoneInformation
FindClose
ReadFile
MoveFileExW
GetFileSizeEx
GetLogicalDrives
MultiByteToWideChar
CreateProcessW
FindNextFileW
GetModuleFileNameW
SetEndOfFile
GlobalLock
OpenProcess
GetFileTime
GetCurrentProcessId
GetModuleHandleA
HeapFree
lstrcmpiW
FindResourceW
HeapAlloc
WaitForSingleObject
GetTempPathW
ReleaseMutex
lstrcatW
Sections
.ezmd Size: 39KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rcxyl Size: 2KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.qjspwh Size: 7KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ