Static task
static1
Behavioral task
behavioral1
Sample
ae329a11642df7d515753137b181766d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ae329a11642df7d515753137b181766d.exe
Resource
win10v2004-20240226-en
General
-
Target
ae329a11642df7d515753137b181766d
-
Size
522KB
-
MD5
ae329a11642df7d515753137b181766d
-
SHA1
8dade784ab912ab7ebe2f342f561ac759124e1bb
-
SHA256
087829984647a232eb0c65703553fcc71a53b264798b5214c6bfa33f55beeed8
-
SHA512
aff2ae6a79e9f6ac4558ff685c6f254b978bdbef596a06bfcd50d500864dab87b28aca9cc6cc526da9535c7265ade5a70bd6c857e6eb879233903be57bf5588c
-
SSDEEP
12288:OEOmSXn4FtJgwYfbCpDRVfWirqjQo0P5FPJf80JX7Kmd2cUFMzs:9OmSX4FtywYfbCpDRVXfrP5FPJf8wXWl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ae329a11642df7d515753137b181766d
Files
-
ae329a11642df7d515753137b181766d.exe windows:5 windows x86 arch:x86
c87fadee3de1b390321ef22f7d8f8498
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SystemTimeToFileTime
GetSystemTime
GetTempPathA
GetDriveTypeA
GetModuleFileNameA
GetTempPathW
GetSystemInfo
WideCharToMultiByte
DeleteFileW
FreeLibrary
GetProcAddress
GetTickCount
SizeofResource
LockResource
CreateFileA
GetLocaleInfoW
GetModuleHandleA
GetModuleHandleW
IsProcessorFeaturePresent
GetProcessHeap
CreateMutexA
OpenEventW
GetCurrentProcessId
GetProcessVersion
GetModuleFileNameW
GetDriveTypeW
ReadFile
RaiseException
CreateFileW
WriteFile
CloseHandle
lstrlenA
OpenMutexW
GetLastError
WaitForSingleObject
LoadLibraryW
Sleep
SetStdHandle
WriteConsoleW
GetConsoleOutputCP
WriteConsoleA
LoadLibraryA
InitializeCriticalSectionAndSpinCount
IsValidLocale
EnumSystemLocalesA
OpenMutexA
GetCurrentThreadId
GetVersion
FindResourceExW
FindResourceW
LoadResource
GetUserDefaultLCID
GetStringTypeW
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSection
DeleteCriticalSection
HeapDestroy
HeapAlloc
HeapFree
HeapReAlloc
HeapSize
InterlockedIncrement
InterlockedDecrement
RtlUnwind
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
VirtualProtect
VirtualAlloc
VirtualQuery
GetStartupInfoW
LCMapStringA
LCMapStringW
GetCPInfo
VirtualFree
HeapCreate
ExitProcess
GetStdHandle
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetACP
GetOEMCP
IsValidCodePage
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetFilePointer
GetLocaleInfoA
GetStringTypeA
MultiByteToWideChar
user32
GetSysColor
ReleaseDC
GetDC
GetCursor
GetForegroundWindow
GetFocus
GetSysColorBrush
GetDesktopWindow
GetSystemMetrics
gdi32
CreateRectRgn
CreateEllipticRgn
CreateRoundRectRgn
CombineRgn
MoveToEx
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
GetStockObject
CreatePen
Rectangle
Ellipse
DeleteObject
DeleteDC
ole32
CoUninitialize
CoInitialize
advapi32
LookupPrivilegeValueW
AdjustTokenPrivileges
OpenProcessToken
shlwapi
PathStripToRootA
PathStripToRootW
Sections
.text Size: 236KB - Virtual size: 235KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 549KB - Virtual size: 548KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ