Static task
static1
Behavioral task
behavioral1
Sample
c863031444f07967cda2f8554cbad10f1778833a4d4e58cca9bbf61223e0c3cf.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c863031444f07967cda2f8554cbad10f1778833a4d4e58cca9bbf61223e0c3cf.exe
Resource
win10v2004-20231215-en
General
-
Target
c863031444f07967cda2f8554cbad10f1778833a4d4e58cca9bbf61223e0c3cf
-
Size
219KB
-
MD5
014b821f6daaeef198f0606052304ffa
-
SHA1
8319a20288c19214dedab96daff4ca4f6943af74
-
SHA256
c863031444f07967cda2f8554cbad10f1778833a4d4e58cca9bbf61223e0c3cf
-
SHA512
fa2114cbcd940264a8ebdf731e82cce4ae56136cd381b5442a1337b70a87f377a30ebe26a975ddf27f031525edd5c0a954591d7c865bd3e2b2232dd18fd0e7b1
-
SSDEEP
3072:vbJ8MJJ/pZ22HPc+Q0j40UvWw48ddLM6hMLIokjwrhpcSvMRmC/:d5XG20ka48ddLM6njNSE/
Malware Config
Signatures
-
Detects executables packed with ASPack 1 IoCs
resource yara_rule sample INDICATOR_EXE_Packed_ASPack -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource c863031444f07967cda2f8554cbad10f1778833a4d4e58cca9bbf61223e0c3cf
Files
-
c863031444f07967cda2f8554cbad10f1778833a4d4e58cca9bbf61223e0c3cf.exe windows:4 windows x86 arch:x86
34030efecac2d5945f30498ad4dfc8da
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
LocalReAlloc
GetStartupInfoA
GetModuleHandleA
lstrcpynA
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
LeaveCriticalSection
EnterCriticalSection
WaitForMultipleObjects
WaitForSingleObject
GetTickCount
CloseHandle
GetLastError
SetEvent
FormatMessageW
InitializeCriticalSection
CreateThread
GetCurrentProcess
SetEnvironmentVariableW
GetCurrentThread
GetSystemDefaultLangID
GetVersionExA
FileTimeToSystemTime
FileTimeToLocalFileTime
InterlockedExchange
MultiByteToWideChar
lstrlenA
DuplicateHandle
FreeLibrary
GetProcAddress
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
DeleteCriticalSection
LocalAlloc
LocalFree
TerminateThread
WideCharToMultiByte
GetUserDefaultLCID
AreFileApisANSI
IsBadReadPtr
SetLastError
LoadLibraryA
LoadLibraryW
CreateEventA
CreateEventW
GetDateFormatA
GetDateFormatW
GetTimeFormatA
GetTimeFormatW
FormatMessageA
GetOEMCP
CreateFileA
VirtualAlloc
user32
LoadCursorW
LoadCursorA
gdi32
GetStockObject
msvcrt
wcsncpy
_callnewh
_except_handler3
__CxxFrameHandler
advapi32
RegOpenKeyW
Sections
.text Size: 207KB - Virtual size: 208KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data4 Size: - Virtual size: 124KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data3 Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data2 Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.aspack Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE