Static task
static1
Behavioral task
behavioral1
Sample
ae162e552aa8244930f6ad471409d50f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ae162e552aa8244930f6ad471409d50f.exe
Resource
win10v2004-20240226-en
General
-
Target
ae162e552aa8244930f6ad471409d50f
-
Size
258KB
-
MD5
ae162e552aa8244930f6ad471409d50f
-
SHA1
775bee3e42e9ed6be4251cb68657f6793983f53a
-
SHA256
792d57469a6a62f64fdcefd5e03b850643f0f3c1c9829fc0f7b32e75fd46328d
-
SHA512
596f82eda9c5910a625b20d8e109e560db7611d33706d2e3b427d0773333c10f9cd628be86f1d47f852b7f633cec08b60880297978bd206021872f97472ee74d
-
SSDEEP
1536:2kQKjwfjZzbX3jH/3zAvpF5fMg9Hyav2Qb6msMFtZBOVpGqglM1nfbTm+Q9i:2ktwfjZf3Sf5v2y6OvZBOzPFBfX49i
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ae162e552aa8244930f6ad471409d50f
Files
-
ae162e552aa8244930f6ad471409d50f.exe windows:0 windows x86 arch:x86
2c351a01263c1e2a785627e6a6300658
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
AddAtomA
BaseCleanupAppcompatCacheSupport
ChangeTimerQueueTimer
CmdBatNotification
CommConfigDialogW
CompareStringA
ConvertDefaultLocale
ConvertThreadToFiber
CopyFileExA
CopyFileExW
CreateDirectoryExA
CreateFileA
CreateJobObjectW
CreateMutexA
CreateMutexW
CreateProcessInternalW
CreateSocketHandle
CreateTapePartition
CreateThread
CreateVirtualBuffer
DebugSetProcessKillOnExit
DecodeSystemPointer
DeleteTimerQueue
DisableThreadLibraryCalls
DisconnectNamedPipe
EncodePointer
EnumDateFormatsExA
EnumLanguageGroupLocalesA
EnumResourceLanguagesA
EnumSystemCodePagesW
EnumSystemGeoID
EnumSystemLocalesW
EnumTimeFormatsA
EnumTimeFormatsW
EnumUILanguagesA
ExpungeConsoleCommandHistoryA
FatalExit
FileTimeToDosDateTime
FindAtomA
FindFirstChangeNotificationW
GetBinaryTypeW
GetCPInfo
GetCPInfoExW
GetCommConfig
GetCommandLineA
GetCompressedFileSizeA
GetConsoleAliasExesLengthA
GetConsoleAliasExesLengthW
GetConsoleAliasesW
GetConsoleInputExeNameA
GetConsoleTitleW
GetDriveTypeA
GetEnvironmentStringsA
GetEnvironmentVariableA
GetFileType
GetHandleInformation
GetLinguistLangSize
GetModuleFileNameA
GetModuleHandleA
GetNumaNodeProcessorMask
GetPrivateProfileIntA
GetPrivateProfileSectionNamesA
GetPrivateProfileSectionW
GetProcAddress
GetProcessIoCounters
GetProcessTimes
GetSystemDefaultLangID
GetSystemDefaultUILanguage
GetThreadSelectorEntry
GetThreadTimes
GetUserDefaultLCID
GetVersion
GetVolumeInformationA
GetVolumeNameForVolumeMountPointA
GetVolumePathNamesForVolumeNameW
GlobalAddAtomW
GlobalGetAtomNameW
GlobalMemoryStatus
GlobalWire
HeapFree
HeapReAlloc
HeapUnlock
HeapValidate
IsBadWritePtr
IsValidUILanguage
LoadLibraryA
LocalAlloc
LocalHandle
LocalReAlloc
LocalSize
LockFileEx
NumaVirtualQueryNode
OpenSemaphoreA
OpenThread
OpenWaitableTimerW
PeekConsoleInputW
Process32First
QueryDepthSList
QueryDosDeviceW
ReadConsoleW
ReadDirectoryChangesW
RegisterWaitForInputIdle
RegisterWowExec
ReleaseMutex
ReleaseSemaphore
RemoveLocalAlternateComputerNameW
SearchPathA
SetClientTimeZoneInformation
SetCommMask
SetComputerNameExW
SetConsoleInputExeNameW
SetConsoleKeyShortcuts
SetConsoleLocalEUDC
SetConsoleNumberOfCommandsW
SetCriticalSectionSpinCount
SetDefaultCommConfigA
SetEndOfFile
SetEvent
SetFileShortNameW
SetInformationJobObject
SetLastConsoleEventActive
SetProcessPriorityBoost
SetThreadIdealProcessor
SetThreadLocale
SetTimerQueueTimer
SetUnhandledExceptionFilter
SetUserGeoID
SetVolumeMountPointA
ShowConsoleCursor
TlsAlloc
UTUnRegister
UnregisterWait
VerLanguageNameA
VirtualAllocEx
WriteConsoleOutputCharacterA
WritePrivateProfileSectionW
WritePrivateProfileStructA
WriteProcessMemory
lstrcatA
lstrcpynW
Sections
.text Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ