Static task
static1
Behavioral task
behavioral1
Sample
8396e905f772d0ac6bee6c50bb2e51d0649586b67f54ad8257116a1f430f5bf0.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
8396e905f772d0ac6bee6c50bb2e51d0649586b67f54ad8257116a1f430f5bf0.exe
Resource
win10v2004-20240226-en
General
-
Target
8396e905f772d0ac6bee6c50bb2e51d0649586b67f54ad8257116a1f430f5bf0
-
Size
202KB
-
MD5
b8860412903fc359c4600563eb03aaac
-
SHA1
4f47a2b7393c62b17f6a4bf9c0873515e62725ab
-
SHA256
8396e905f772d0ac6bee6c50bb2e51d0649586b67f54ad8257116a1f430f5bf0
-
SHA512
7ecb9a2e02486ae49ce6c4a988708a81368183a45e4747fed33044a98535a58aff19625808dab99cd4abefe9384223ab1785969e71ac2074b9d3288c2409b921
-
SSDEEP
3072:+LDJHh2QdP8cIltNnTbNf1TTU0cl4UdbI3Cdic1h6qFs3DXwUSxgZ2v:8NwmoNnTd1vqTI3H6h60wDAKkv
Malware Config
Signatures
-
Detects executables packed with ASPack 1 IoCs
resource yara_rule sample INDICATOR_EXE_Packed_ASPack -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8396e905f772d0ac6bee6c50bb2e51d0649586b67f54ad8257116a1f430f5bf0
Files
-
8396e905f772d0ac6bee6c50bb2e51d0649586b67f54ad8257116a1f430f5bf0.exe windows:5 windows x86 arch:x86
bb553e8a580582ebe99003b54cf4e675
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
FindClose
FindFirstFileW
FormatMessageW
FreeLibrary
GetComputerNameExW
GetComputerNameW
GetConsoleMode
GetConsoleScreenBufferInfo
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDriveTypeW
GetLastError
GetLogicalDrives
GetModuleHandleA
GetStdHandle
GetSystemDirectoryW
GetSystemTimeAsFileTime
GetTickCount
GetTimeFormatW
GetVolumeInformationW
LoadLibraryW
FileTimeToSystemTime
MultiByteToWideChar
OpenProcess
QueryPerformanceCounter
ReadConsoleW
SetConsoleCursorPosition
SetConsoleMode
SetLastError
SetUnhandledExceptionFilter
TerminateProcess
UnhandledExceptionFilter
VerSetConditionMask
VerifyVersionInfoW
VirtualFree
VirtualQuery
WideCharToMultiByte
WriteConsoleW
lstrcmpW
lstrcmpiW
lstrcpyW
lstrcpynW
lstrlenW
CompareStringW
CloseHandle
VirtualAlloc
ReadFile
GetCPInfo
GetWindowsDirectoryW
lstrcatW
CreateFileW
LoadLibraryA
LocalFree
GetProcAddress
user32
LoadIconA
LoadIconW
advapi32
RegOpenKeyExW
RegCloseKey
OpenProcessToken
LookupPrivilegeValueW
LookupAccountSidW
GetTokenInformation
AdjustTokenPrivileges
RegQueryValueExW
RegSetValueExW
RegConnectRegistryW
msvcrt
_XcptFilter
__CxxFrameHandler
__p__commode
__p__fmode
__set_app_type
__setusermatherr
__wgetmainargs
__winitenv
_adjust_fdiv
_c_exit
_cexit
_controlfp
_except_handler3
_exit
_initterm
_iob
_wcsicmp
_wcsnicmp
_wgetcwd
_wtol
calloc
exit
fflush
fprintf
free
malloc
realloc
sprintf
strtok
wcschr
wcslen
wcsncmp
wcsncpy
wcsstr
wcstod
wcstok
wcstol
Sections
.text Size: 13KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 178KB - Virtual size: 180KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 164KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.aspack Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE