Static task
static1
Behavioral task
behavioral1
Sample
5bbf66bb0f60515b6b701e11e1b1d0aeee00af3814592b84cf98889f600d97a6.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5bbf66bb0f60515b6b701e11e1b1d0aeee00af3814592b84cf98889f600d97a6.exe
Resource
win10v2004-20240226-en
General
-
Target
5bbf66bb0f60515b6b701e11e1b1d0aeee00af3814592b84cf98889f600d97a6
-
Size
263KB
-
MD5
d6564ea3120fb1ef90479d5d383f1b2b
-
SHA1
447d5e0750edb564adc10a943d64b63cf5ac9362
-
SHA256
5bbf66bb0f60515b6b701e11e1b1d0aeee00af3814592b84cf98889f600d97a6
-
SHA512
c13043fff2a10461e9e54477348c81793031bd1a5d70ea8adc64f79358f898ec80721dbf63a110a719730c58b86e6ceab074dcee1990390786a6af05ca51b89b
-
SSDEEP
6144:cST/k0YujFn2CfBoZG3gLm5WelllPJ7ImcQ:PsxujcCfOBoDN9Im3
Malware Config
Signatures
-
Detects executables packed with ASPack 1 IoCs
resource yara_rule sample INDICATOR_EXE_Packed_ASPack -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5bbf66bb0f60515b6b701e11e1b1d0aeee00af3814592b84cf98889f600d97a6
Files
-
5bbf66bb0f60515b6b701e11e1b1d0aeee00af3814592b84cf98889f600d97a6.exe windows:5 windows x86 arch:x86
2b3fe42b59a6c54c1699187a146367d7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetEnvironmentVariableA
GetFileAttributesA
GetLastError
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetSystemTimeAsFileTime
GetTickCount
GetCommandLineW
LoadLibraryA
QueryPerformanceCounter
ReleaseMutex
SetErrorMode
SetUnhandledExceptionFilter
TerminateProcess
UnhandledExceptionFilter
WaitForSingleObject
lstrcpynA
lstrlenA
lstrlenW
FreeLibrary
ExitProcess
CreateMutexA
CloseHandle
GetSystemDirectoryA
lstrcatA
CreateFileA
VirtualAlloc
GetCPInfo
ReadFile
GetVersionExA
user32
LoadIconW
LoadIconA
advapi32
OpenProcessToken
RegCloseKey
LookupPrivilegeValueW
LookupAccountSidW
GetTokenInformation
AdjustTokenPrivileges
RegOpenKeyExW
RegQueryValueExW
RegSetValueExW
RegConnectRegistryW
msvcrt
_XcptFilter
__CxxFrameHandler
__p__commode
__p__fmode
__set_app_type
__setusermatherr
__wgetmainargs
__winitenv
_adjust_fdiv
_c_exit
_cexit
_controlfp
_except_handler3
_exit
_initterm
_iob
_wcsicmp
_wcsnicmp
_wgetcwd
_wtol
calloc
exit
fflush
fprintf
free
malloc
realloc
sprintf
strtok
wcschr
wcslen
wcsncmp
wcsncpy
wcsstr
wcstod
wcstok
wcstol
Sections
.text Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 30KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 207KB - Virtual size: 208KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata4 Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata3 Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata2 Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 92KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.aspack Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE