Static task
static1
Behavioral task
behavioral1
Sample
a2f0bea74817c2a4b3a644d4d45ab6951d6485502ce728f3afee6ed96c0f8415.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a2f0bea74817c2a4b3a644d4d45ab6951d6485502ce728f3afee6ed96c0f8415.exe
Resource
win10v2004-20240226-en
General
-
Target
a2f0bea74817c2a4b3a644d4d45ab6951d6485502ce728f3afee6ed96c0f8415
-
Size
219KB
-
MD5
480badbe75bd6a25ef1b98c0306ab934
-
SHA1
3828c4b913bf93bd394279f6c2cf44c3b47835db
-
SHA256
a2f0bea74817c2a4b3a644d4d45ab6951d6485502ce728f3afee6ed96c0f8415
-
SHA512
8eb0ff5daea0068e4b41baf187169bf240c9d7bd5ca22b2e3e8bd66c0b55cd1fce41abfd08588cad4bafc29262e3b1cacff7b7aaed2bfc7b76967d95aebbdcf1
-
SSDEEP
3072:vbJ8MJJ/pZ22HPc+Q0j40UvWw48ddLM6hMLIokjwrhpcSvMRmCB:d5XG20ka48ddLM6njNSEB
Malware Config
Signatures
-
Detects executables packed with ASPack 1 IoCs
resource yara_rule sample INDICATOR_EXE_Packed_ASPack -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a2f0bea74817c2a4b3a644d4d45ab6951d6485502ce728f3afee6ed96c0f8415
Files
-
a2f0bea74817c2a4b3a644d4d45ab6951d6485502ce728f3afee6ed96c0f8415.exe windows:4 windows x86 arch:x86
34030efecac2d5945f30498ad4dfc8da
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
LocalReAlloc
GetStartupInfoA
GetModuleHandleA
lstrcpynA
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
LeaveCriticalSection
EnterCriticalSection
WaitForMultipleObjects
WaitForSingleObject
GetTickCount
CloseHandle
GetLastError
SetEvent
FormatMessageW
InitializeCriticalSection
CreateThread
GetCurrentProcess
SetEnvironmentVariableW
GetCurrentThread
GetSystemDefaultLangID
GetVersionExA
FileTimeToSystemTime
FileTimeToLocalFileTime
InterlockedExchange
MultiByteToWideChar
lstrlenA
DuplicateHandle
FreeLibrary
GetProcAddress
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
DeleteCriticalSection
LocalAlloc
LocalFree
TerminateThread
WideCharToMultiByte
GetUserDefaultLCID
AreFileApisANSI
IsBadReadPtr
SetLastError
LoadLibraryA
LoadLibraryW
CreateEventA
CreateEventW
GetDateFormatA
GetDateFormatW
GetTimeFormatA
GetTimeFormatW
FormatMessageA
GetOEMCP
CreateFileA
VirtualAlloc
user32
LoadCursorW
LoadCursorA
gdi32
GetStockObject
msvcrt
wcsncpy
_callnewh
_except_handler3
__CxxFrameHandler
advapi32
RegOpenKeyW
Sections
.text Size: 207KB - Virtual size: 208KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data4 Size: - Virtual size: 124KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data3 Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data2 Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.aspack Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE