Static task
static1
Behavioral task
behavioral1
Sample
8aa72056fd7bf29fafe1775644dd902ac463b525ac06d16da3d1abd33e5d49d3.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral2
Sample
8aa72056fd7bf29fafe1775644dd902ac463b525ac06d16da3d1abd33e5d49d3.exe
Resource
win11-20240221-en
General
-
Target
8aa72056fd7bf29fafe1775644dd902ac463b525ac06d16da3d1abd33e5d49d3
-
Size
395KB
-
MD5
4dd2720b43eb24371ac6cdc1b0615110
-
SHA1
1d6462f0a44d8f950a31e436a53ebc1faf900ff4
-
SHA256
8aa72056fd7bf29fafe1775644dd902ac463b525ac06d16da3d1abd33e5d49d3
-
SHA512
8ba89ef1fd2c500451aef53946e1d6d7f45503f2f7deda09cf94d3d5102c0f1f020dfe31acb123c3599434af696b407823f35b3ed2fb3db7df78a927073f921f
-
SSDEEP
6144:opzhPD7nxOK5xCGhp8YSdCAunbm6j+8cfgUQtWl:SztD7nfCGhp87N2nqXf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 8aa72056fd7bf29fafe1775644dd902ac463b525ac06d16da3d1abd33e5d49d3
Files
-
8aa72056fd7bf29fafe1775644dd902ac463b525ac06d16da3d1abd33e5d49d3.exe windows:5 windows x86 arch:x86
32db0a910f88bc9b49b86745793d5182
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
IsBadHugeReadPtr
GetCommState
HeapFree
GetComputerNameW
LockFile
ConnectNamedPipe
GetModuleHandleW
GetConsoleAliasesLengthA
GetDateFormatA
GetCurrencyFormatW
GetConsoleCP
GlobalAlloc
VirtualFreeEx
LoadLibraryW
GetConsoleAliasExesLengthW
GetLocaleInfoA
GetAtomNameW
SetConsoleTitleA
SetCurrentDirectoryA
GetCurrentDirectoryW
GetProcAddress
FindVolumeMountPointClose
LoadLibraryA
FindFirstVolumeMountPointW
HeapLock
GetModuleFileNameA
FreeEnvironmentStringsW
DeleteCriticalSection
SetCalendarInfoA
SetStdHandle
SetFilePointer
SetDefaultCommConfigA
GetVersionExW
HeapReAlloc
HeapAlloc
ExitProcess
DecodePointer
GetCommandLineW
HeapSetInformation
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
WriteFile
GetStdHandle
GetModuleFileNameW
HeapCreate
EnterCriticalSection
LeaveCriticalSection
GetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
RtlUnwind
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
MultiByteToWideChar
WideCharToMultiByte
HeapSize
IsProcessorFeaturePresent
GetConsoleMode
FlushFileBuffers
LCMapStringW
GetStringTypeW
ReadFile
CloseHandle
WriteConsoleW
CreateFileW
user32
LoadIconA
advapi32
OpenThreadToken
RegCreateKeyA
Sections
.text Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 283KB - Virtual size: 282KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 39.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 68KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ