D:\IA_CODEBASE\ia\main\sea\Win32\iase\Release_GUI_Highest\iase.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ac0c318bac494b8453490fec4ca1cf1b596fd5487dd81ebf6b1a32ffacc545fe.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ac0c318bac494b8453490fec4ca1cf1b596fd5487dd81ebf6b1a32ffacc545fe.exe
Resource
win10v2004-20240226-en
General
-
Target
ac0c318bac494b8453490fec4ca1cf1b596fd5487dd81ebf6b1a32ffacc545fe
-
Size
4.8MB
-
MD5
e4fe78e244c7ddf7b7f3703763f64c4c
-
SHA1
e971e6a60712d23dc5381f67111e5591c3379d1b
-
SHA256
ac0c318bac494b8453490fec4ca1cf1b596fd5487dd81ebf6b1a32ffacc545fe
-
SHA512
eca3a8ed44f02a3e4f6fe37cd23f23f8a7fdb3cdc8af3374bf7c6c1ca71439ceaf9baa66e370a0e0a71744a84f17e030d226af6e0ceeb88c3abf8b58b34eecbb
-
SSDEEP
98304:ppEATUIaxxBvaeIMlpSHLs8Y8LahlbkP6Fz6MMZ0:pp9TOxxBvaeIMlcLTnWhlbkCFz8Z0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ac0c318bac494b8453490fec4ca1cf1b596fd5487dd81ebf6b1a32ffacc545fe
Files
-
ac0c318bac494b8453490fec4ca1cf1b596fd5487dd81ebf6b1a32ffacc545fe.exe windows:6 windows x64 arch:x64
a9d4f665f815bcbb56038bc843dd1bbe
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Imports
shlwapi
PathIsDirectoryW
kernel32
CreateFileW
DeleteFileW
GetFileAttributesW
GetFileSize
GetFullPathNameW
GetLongPathNameW
CloseHandle
GetCommandLineW
GetEnvironmentVariableW
SetCurrentDirectoryW
GetCurrentDirectoryW
CreateDirectoryW
FindClose
FindFirstFileW
FindNextFileW
GetDiskFreeSpaceW
RemoveDirectoryW
SetFileAttributesW
GetTempPathW
GetLastError
WaitForSingleObject
GetExitCodeProcess
CreateProcessW
GetSystemDirectoryW
GetVersionExW
GetModuleFileNameW
GetProcAddress
LoadResource
WriteConsoleW
LoadLibraryW
lstrcmpiW
WideCharToMultiByte
GetLocaleInfoW
GetNumberFormatW
GetConsoleTitleW
GetConsoleWindow
GetModuleHandleW
GetTimeFormatW
HeapSize
HeapReAlloc
OutputDebugStringW
SetConsoleCtrlHandler
GetProcessHeap
SetEnvironmentVariableW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
SetEndOfFile
GetFileSizeEx
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
LCMapStringW
FindResourceW
TerminateProcess
GetDateFormatW
FlsFree
FlsSetValue
FlsGetValue
SetFileTime
DosDateTimeToFileTime
GetTimeZoneInformation
MultiByteToWideChar
EnterCriticalSection
LeaveCriticalSection
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
SetEvent
ResetEvent
WaitForSingleObjectEx
CreateEventW
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
FlsAlloc
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
FormatMessageA
GetStringTypeW
InitializeCriticalSectionEx
LocalFree
GetLocaleInfoEx
EncodePointer
DecodePointer
LCMapStringEx
CompareStringEx
GetCPInfo
RtlPcToFileHeader
RaiseException
RtlUnwindEx
RtlUnwind
InterlockedPushEntrySList
InterlockedFlushSList
SetLastError
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
LoadLibraryExW
SetStdHandle
GetFileType
ReadFile
GetDriveTypeW
GetFileInformationByHandle
PeekNamedPipe
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
MoveFileExW
SetFilePointerEx
ExitProcess
GetModuleHandleExW
GetStdHandle
WriteFile
GetConsoleMode
ReadConsoleW
GetConsoleOutputCP
GetCurrentThread
HeapFree
FlushFileBuffers
HeapAlloc
CompareStringW
user32
LoadIconW
LoadCursorW
FindWindowW
GetWindowLongPtrW
DrawTextW
KillTimer
SetTimer
GetKeyState
SetDlgItemTextW
GetDlgItem
PeekMessageW
DialogBoxParamW
ShowWindow
RegisterClassExW
PostQuitMessage
DefWindowProcW
SendMessageW
LoadStringW
EndDialog
TranslateMessage
DispatchMessageW
gdi32
GetStockObject
shell32
SHGetPathFromIDListW
SHGetMalloc
SHBrowseForFolderW
Sections
.text Size: 943KB - Virtual size: 942KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 194KB - Virtual size: 193KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 46KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 358KB - Virtual size: 357KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ