Static task
static1
Behavioral task
behavioral1
Sample
82bef575216c7266d154ca91968df2e49f2265a416958326f344d5863b55ea03.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
82bef575216c7266d154ca91968df2e49f2265a416958326f344d5863b55ea03.exe
Resource
win10v2004-20240226-en
General
-
Target
82bef575216c7266d154ca91968df2e49f2265a416958326f344d5863b55ea03
-
Size
202KB
-
MD5
ccd437d7871b5ec62d6057df65c9e671
-
SHA1
aaf646ce58a35d46a19fe3482a42c2a222ac809a
-
SHA256
82bef575216c7266d154ca91968df2e49f2265a416958326f344d5863b55ea03
-
SHA512
d4774a2c4c906f324becff6f2f44980bba8a439f9be1dbf1dfbaae6a49230696212069cae0601e1ae9d5887f43da3448eccdb89f3e123ea30d4b93f10d1416fc
-
SSDEEP
3072:+LDJHh2QdP8cIltNnTbNf1TTU0cl4UdbI3Cdic1h6qFs3DXwUSxgZ2yU:8NwmoNnTd1vqTI3H6h60wDAKkyU
Malware Config
Signatures
-
Detects executables packed with ASPack 1 IoCs
resource yara_rule sample INDICATOR_EXE_Packed_ASPack -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 82bef575216c7266d154ca91968df2e49f2265a416958326f344d5863b55ea03
Files
-
82bef575216c7266d154ca91968df2e49f2265a416958326f344d5863b55ea03.exe windows:5 windows x86 arch:x86
bb553e8a580582ebe99003b54cf4e675
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
FindClose
FindFirstFileW
FormatMessageW
FreeLibrary
GetComputerNameExW
GetComputerNameW
GetConsoleMode
GetConsoleScreenBufferInfo
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDriveTypeW
GetLastError
GetLogicalDrives
GetModuleHandleA
GetStdHandle
GetSystemDirectoryW
GetSystemTimeAsFileTime
GetTickCount
GetTimeFormatW
GetVolumeInformationW
LoadLibraryW
FileTimeToSystemTime
MultiByteToWideChar
OpenProcess
QueryPerformanceCounter
ReadConsoleW
SetConsoleCursorPosition
SetConsoleMode
SetLastError
SetUnhandledExceptionFilter
TerminateProcess
UnhandledExceptionFilter
VerSetConditionMask
VerifyVersionInfoW
VirtualFree
VirtualQuery
WideCharToMultiByte
WriteConsoleW
lstrcmpW
lstrcmpiW
lstrcpyW
lstrcpynW
lstrlenW
CompareStringW
CloseHandle
VirtualAlloc
ReadFile
GetCPInfo
GetWindowsDirectoryW
lstrcatW
CreateFileW
LoadLibraryA
LocalFree
GetProcAddress
user32
LoadIconA
LoadIconW
advapi32
RegOpenKeyExW
RegCloseKey
OpenProcessToken
LookupPrivilegeValueW
LookupAccountSidW
GetTokenInformation
AdjustTokenPrivileges
RegQueryValueExW
RegSetValueExW
RegConnectRegistryW
msvcrt
_XcptFilter
__CxxFrameHandler
__p__commode
__p__fmode
__set_app_type
__setusermatherr
__wgetmainargs
__winitenv
_adjust_fdiv
_c_exit
_cexit
_controlfp
_except_handler3
_exit
_initterm
_iob
_wcsicmp
_wcsnicmp
_wgetcwd
_wtol
calloc
exit
fflush
fprintf
free
malloc
realloc
sprintf
strtok
wcschr
wcslen
wcsncmp
wcsncpy
wcsstr
wcstod
wcstok
wcstol
Sections
.text Size: 13KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 178KB - Virtual size: 180KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 164KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.aspack Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE