Static task
static1
Behavioral task
behavioral1
Sample
60894f502ddd1528f0ab235e7f5cad5a597f454449cd4aae07f6d486de5550d4.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
60894f502ddd1528f0ab235e7f5cad5a597f454449cd4aae07f6d486de5550d4.exe
Resource
win10v2004-20240226-en
General
-
Target
60894f502ddd1528f0ab235e7f5cad5a597f454449cd4aae07f6d486de5550d4
-
Size
224KB
-
MD5
ae62ab4a1ba123f895167006d40eb7db
-
SHA1
7a60d806c57e4f454005431ace9abc50c383b15c
-
SHA256
60894f502ddd1528f0ab235e7f5cad5a597f454449cd4aae07f6d486de5550d4
-
SHA512
292336f6a333ba53c13515bbcd333b68e63ae077992f35307e0f4421d89209ccd20741af598382cc7f9b0520cffae197ddf3938d209abb7e1c2d06c74f19990d
-
SSDEEP
3072:8iVZBM1JrvMALnxgRzV7bbd6/R6AAb4Ux8cvxWRjTKEJV/R6xEjWswRdpNky:8iV3M7tVId60AGkRj2EItHpV
Malware Config
Signatures
-
Detects executables packed with ASPack 1 IoCs
resource yara_rule sample INDICATOR_EXE_Packed_ASPack -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 60894f502ddd1528f0ab235e7f5cad5a597f454449cd4aae07f6d486de5550d4
Files
-
60894f502ddd1528f0ab235e7f5cad5a597f454449cd4aae07f6d486de5550d4.exe windows:4 windows x86 arch:x86
c3c2b4ccfef5b46f908b991e2cd862b7
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
ExitProcess
GetSystemTime
CreateThread
WaitForMultipleObjects
SetEvent
GetProcessHeap
HeapFree
GetUserDefaultLCID
RaiseException
InterlockedDecrement
InterlockedIncrement
CloseHandle
LoadResource
LockResource
GetThreadLocale
FreeLibrary
GetSystemInfo
QueryDosDeviceW
QueryDosDeviceA
lstrlenA
GetSystemDirectoryW
GetSystemDirectoryA
UnmapViewOfFile
GetDriveTypeA
GetDateFormatW
CreateMutexW
CreateMutexA
CompareStringW
GetShortPathNameA
GetWindowsDirectoryW
GlobalLock
GlobalSize
GlobalAlloc
GlobalUnlock
GlobalFree
GetLocaleInfoA
CreateFileMappingW
CreateFileMappingA
GetVersionExW
SetFileAttributesW
SetFileAttributesA
IsBadWritePtr
lstrcmpiW
lstrcmpiA
LoadLibraryExW
LoadLibraryExA
LoadLibraryW
LoadLibraryA
LCMapStringW
LCMapStringA
GetVolumeInformationW
GetTempPathA
GetTempFileNameW
GetTempFileNameA
GetPrivateProfileStringW
GetPrivateProfileStringA
lstrcpynW
GetModuleHandleW
GetModuleFileNameW
GetModuleFileNameA
SystemTimeToFileTime
GetLocalTime
MapViewOfFile
GetFileType
SetFilePointer
SetEndOfFile
GetFileSize
ReadFile
WriteFile
FlushFileBuffers
WaitForSingleObject
CompareFileTime
SetThreadPriority
Sleep
GetLongPathNameA
GetLongPathNameW
ReleaseMutex
InterlockedExchange
GetStartupInfoW
GetModuleHandleA
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
FindClose
IsValidLocale
SetErrorMode
FileTimeToSystemTime
lstrcatA
lstrcpyA
GetACP
DebugBreak
InterlockedCompareExchange
GetExitCodeThread
DeviceIoControl
GetVersion
HeapAlloc
GetDriveTypeW
GetDateFormatA
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
WideCharToMultiByte
MultiByteToWideChar
GetVersionExA
lstrlenW
GetLastError
GetWindowsDirectoryA
GetProcAddress
SetLastError
CopyFileA
CopyFileW
CompareStringA
CreateDirectoryA
CreateDirectoryW
CreateEventA
CreateEventW
CreateFileA
CreateFileW
DeleteFileA
DeleteFileW
FindFirstFileA
FindFirstFileW
FindNextFileA
FindNextFileW
FindResourceA
FindResourceW
LocalFree
LocalAlloc
GetFileAttributesA
GetFileAttributesW
GetFileAttributesExA
GetFileAttributesExW
GetFullPathNameA
GetFullPathNameW
GetStartupInfoA
GetCommandLineA
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
VirtualAlloc
GetCurrentThread
GetOEMCP
user32
BeginPaint
GetClientRect
EndPaint
PostQuitMessage
DefWindowProcA
LoadCursorA
gdi32
PlayEnhMetaFile
DeleteEnhMetaFile
msvcrt
_c_exit
__CxxFrameHandler
iswcntrl
isxdigit
towlower
towupper
wcsncmp
wcslen
memmove
wcsrchr
wcsspn
iswspace
iswascii
wcspbrk
wcschr
wcsstr
_wcsnicmp
_wtol
_vsnwprintf
_wcsicmp
_CIpow
_purecall
swscanf
_ftol
iswdigit
_wtoi
iswalnum
_wtoi64
_controlfp
wcstoul
floor
memcmp
atoi
memset
_snwprintf
wcsncpy
wcscpy
memcpy
free
strchr
_exit
_XcptFilter
_cexit
exit
_wcmdln
__wgetmainargs
_initterm
__setusermatherr
_adjust_fdiv
isdigit
ceil
_vsnprintf
_strnicmp
malloc
wcscat
rand
realloc
toupper
isspace
atol
swprintf
_stricmp
strncpy
wcscspn
_wcsupr
wcstombs
bsearch
_ultow
_onexit
__dllonexit
_except_handler3
__set_app_type
__p__fmode
__p__commode
abs
qsort
wcscmp
srand
_beginthreadex
advapi32
SetFileSecurityW
GetFileSecurityW
RegCloseKey
RegQueryValueExW
RegQueryValueExA
RegSetValueExW
RegSetValueExA
RegQueryInfoKeyW
RegQueryInfoKeyA
RegOpenKeyExW
RegOpenKeyExA
RegEnumValueW
RegEnumValueA
RegEnumKeyA
RegCreateKeyExW
RegCreateKeyExA
GetUserNameA
RegOpenKeyW
Sections
.text Size: 208KB - Virtual size: 208KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 7KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 132KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.aspack Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE