D:\IA_CODEBASE\ia\main\sea\Win32\iase\Release_GUI_Admin\iase.pdb
Static task
static1
Behavioral task
behavioral1
Sample
bf0ec336c860c08f79b2b98928c01cc2f49503c6476636464a30cf2d318ac6b9.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
bf0ec336c860c08f79b2b98928c01cc2f49503c6476636464a30cf2d318ac6b9.exe
Resource
win10v2004-20240226-en
General
-
Target
bf0ec336c860c08f79b2b98928c01cc2f49503c6476636464a30cf2d318ac6b9
-
Size
4.8MB
-
MD5
256d77daa9aba4c30a8beba8fe6e0ae0
-
SHA1
94b40b97a7671d375435a6b737a2bed0475dedf6
-
SHA256
bf0ec336c860c08f79b2b98928c01cc2f49503c6476636464a30cf2d318ac6b9
-
SHA512
2d672a3ba4c2a00b1d5f36a900aa99d8d7f7e0a3e5cd46ab9f9d591e3d3bf085f2e2f44d034fde134d9ebdde0cfb36654ec961c19f14e631a37c70e5ff2c8682
-
SSDEEP
98304:FpEAJfD3FxB5aeIMQ4OV1Kp5ZvY1LaStbke0Fh7XEk:Fp9JBxB5aeIM4wBvWWStbkVFH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bf0ec336c860c08f79b2b98928c01cc2f49503c6476636464a30cf2d318ac6b9
Files
-
bf0ec336c860c08f79b2b98928c01cc2f49503c6476636464a30cf2d318ac6b9.exe windows:6 windows x64 arch:x64
a9d4f665f815bcbb56038bc843dd1bbe
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
shlwapi
PathIsDirectoryW
kernel32
CreateFileW
DeleteFileW
GetFileAttributesW
GetFileSize
GetFullPathNameW
GetLongPathNameW
CloseHandle
GetCommandLineW
GetEnvironmentVariableW
SetCurrentDirectoryW
GetCurrentDirectoryW
CreateDirectoryW
FindClose
FindFirstFileW
FindNextFileW
GetDiskFreeSpaceW
RemoveDirectoryW
SetFileAttributesW
GetTempPathW
GetLastError
WaitForSingleObject
GetExitCodeProcess
CreateProcessW
GetSystemDirectoryW
GetVersionExW
GetModuleFileNameW
GetProcAddress
LoadResource
WriteConsoleW
LoadLibraryW
lstrcmpiW
WideCharToMultiByte
GetLocaleInfoW
GetNumberFormatW
GetConsoleTitleW
GetConsoleWindow
GetModuleHandleW
GetTimeFormatW
HeapSize
HeapReAlloc
OutputDebugStringW
SetConsoleCtrlHandler
GetProcessHeap
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
SetEndOfFile
GetFileSizeEx
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
LCMapStringW
FindResourceW
TerminateProcess
GetDateFormatW
FlsFree
FlsSetValue
FlsGetValue
SetFileTime
DosDateTimeToFileTime
GetTimeZoneInformation
MultiByteToWideChar
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
FlsAlloc
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
FormatMessageA
GetStringTypeW
InitializeCriticalSectionEx
LocalFree
GetLocaleInfoEx
EncodePointer
DecodePointer
LCMapStringEx
CompareStringEx
GetCPInfo
RtlPcToFileHeader
RaiseException
RtlUnwindEx
RtlUnwind
InterlockedPushEntrySList
InterlockedFlushSList
SetLastError
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
SetStdHandle
GetFileType
ReadFile
GetDriveTypeW
GetFileInformationByHandle
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
MoveFileExW
SetFilePointerEx
ExitProcess
GetModuleHandleExW
GetStdHandle
WriteFile
GetConsoleMode
ReadConsoleW
GetConsoleOutputCP
GetCurrentThread
HeapFree
FlushFileBuffers
HeapAlloc
CompareStringW
user32
LoadIconW
LoadCursorW
FindWindowW
GetWindowLongPtrW
DrawTextW
KillTimer
SetTimer
GetKeyState
SetDlgItemTextW
GetDlgItem
PeekMessageW
DialogBoxParamW
ShowWindow
RegisterClassExW
PostQuitMessage
DefWindowProcW
SendMessageW
LoadStringW
EndDialog
TranslateMessage
DispatchMessageW
gdi32
GetStockObject
shell32
SHGetPathFromIDListW
SHGetMalloc
SHBrowseForFolderW
Sections
.text Size: 943KB - Virtual size: 942KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 194KB - Virtual size: 193KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 46KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 358KB - Virtual size: 357KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ