Static task
static1
Behavioral task
behavioral1
Sample
f552d2013378ba9a6ba190ed5ec926d6535839942bf18d5845a070aa4d79311c.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
f552d2013378ba9a6ba190ed5ec926d6535839942bf18d5845a070aa4d79311c.exe
Resource
win10v2004-20231215-en
General
-
Target
f552d2013378ba9a6ba190ed5ec926d6535839942bf18d5845a070aa4d79311c
-
Size
202KB
-
MD5
54641ca3fbd581869a5b1cac73d30552
-
SHA1
a3463477c74843db728eb1f7f171301fd9d698fe
-
SHA256
f552d2013378ba9a6ba190ed5ec926d6535839942bf18d5845a070aa4d79311c
-
SHA512
6b140c8529519763253f3cb9ed0216844b85440e351a78818ca2c0c3911ea31d46bdf33027607b2fb24e0c696f1639173eb018af7311d4d4020c7fecf99ade0b
-
SSDEEP
3072:+LDJHh2QdP8cIltNnTbNf1TTU0cl4UdbI3Cdic1h6qFs3DXwUSxgZ2yQ:8NwmoNnTd1vqTI3H6h60wDAKkyQ
Malware Config
Signatures
-
Detects executables packed with ASPack 1 IoCs
resource yara_rule sample INDICATOR_EXE_Packed_ASPack -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource f552d2013378ba9a6ba190ed5ec926d6535839942bf18d5845a070aa4d79311c
Files
-
f552d2013378ba9a6ba190ed5ec926d6535839942bf18d5845a070aa4d79311c.exe windows:5 windows x86 arch:x86
bb553e8a580582ebe99003b54cf4e675
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
FindClose
FindFirstFileW
FormatMessageW
FreeLibrary
GetComputerNameExW
GetComputerNameW
GetConsoleMode
GetConsoleScreenBufferInfo
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetDriveTypeW
GetLastError
GetLogicalDrives
GetModuleHandleA
GetStdHandle
GetSystemDirectoryW
GetSystemTimeAsFileTime
GetTickCount
GetTimeFormatW
GetVolumeInformationW
LoadLibraryW
FileTimeToSystemTime
MultiByteToWideChar
OpenProcess
QueryPerformanceCounter
ReadConsoleW
SetConsoleCursorPosition
SetConsoleMode
SetLastError
SetUnhandledExceptionFilter
TerminateProcess
UnhandledExceptionFilter
VerSetConditionMask
VerifyVersionInfoW
VirtualFree
VirtualQuery
WideCharToMultiByte
WriteConsoleW
lstrcmpW
lstrcmpiW
lstrcpyW
lstrcpynW
lstrlenW
CompareStringW
CloseHandle
VirtualAlloc
ReadFile
GetCPInfo
GetWindowsDirectoryW
lstrcatW
CreateFileW
LoadLibraryA
LocalFree
GetProcAddress
user32
LoadIconA
LoadIconW
advapi32
RegOpenKeyExW
RegCloseKey
OpenProcessToken
LookupPrivilegeValueW
LookupAccountSidW
GetTokenInformation
AdjustTokenPrivileges
RegQueryValueExW
RegSetValueExW
RegConnectRegistryW
msvcrt
_XcptFilter
__CxxFrameHandler
__p__commode
__p__fmode
__set_app_type
__setusermatherr
__wgetmainargs
__winitenv
_adjust_fdiv
_c_exit
_cexit
_controlfp
_except_handler3
_exit
_initterm
_iob
_wcsicmp
_wcsnicmp
_wgetcwd
_wtol
calloc
exit
fflush
fprintf
free
malloc
realloc
sprintf
strtok
wcschr
wcslen
wcsncmp
wcsncpy
wcsstr
wcstod
wcstok
wcstol
Sections
.text Size: 13KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 178KB - Virtual size: 180KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 164KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.aspack Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE