Static task
static1
Behavioral task
behavioral1
Sample
aeadb414d0dcddec57d565c9aa04afc94c3af4d44f13700eaddc729f26ecc534.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
aeadb414d0dcddec57d565c9aa04afc94c3af4d44f13700eaddc729f26ecc534.exe
Resource
win10v2004-20240226-en
General
-
Target
aeadb414d0dcddec57d565c9aa04afc94c3af4d44f13700eaddc729f26ecc534
-
Size
99KB
-
MD5
fa282baa82ca24799cb09670aef5c3c9
-
SHA1
5b85e9e493f991df4ead1ea8cccd094219d4f611
-
SHA256
aeadb414d0dcddec57d565c9aa04afc94c3af4d44f13700eaddc729f26ecc534
-
SHA512
b3071f115ab2dd8d39a16f9d939b48ae0cc35dbf484db5e6fe32dde9b0a5f27aefda37e4dac79050794c26a6adf627f8127dc877d84af46591a879b46909cb31
-
SSDEEP
1536:xYFI8k9Md13ytGp3QpcFCucT58bPKsKZRh2DRpeHXDJS6:xqk9MCtGp3QuvcNuKsKZRhupeHXD86
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource aeadb414d0dcddec57d565c9aa04afc94c3af4d44f13700eaddc729f26ecc534
Files
-
aeadb414d0dcddec57d565c9aa04afc94c3af4d44f13700eaddc729f26ecc534.exe windows:4 windows x64 arch:x64
1e49485a1d345723584e92fae9fc4402
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
CloseHandle
FormatMessageW
GetModuleHandleW
GetOEMCP
GetProcAddress
GetStdHandle
GetTickCount
HeapAlloc
HeapFree
HeapReAlloc
K32EnumProcessModules
K32EnumProcesses
K32GetModuleBaseNameW
OpenProcess
TerminateProcess
WideCharToMultiByte
WriteConsoleW
WriteFile
lstrcmpW
ntdll
_vsnprintf
ucrtbase
__acrt_iob_func
__p___argc
__p___wargv
__stdio_common_vsprintf
_configure_wide_argv
_get_initial_wide_environment
_initialize_wide_environment
_set_app_type
_strdup
_wcsicmp
exit
free
fwrite
getenv
iswdigit
memcmp
memmove
strchr
strcmp
strcpy
strcspn
strlen
wcstol
user32
EnumWindows
GetWindowThreadProcessId
LoadStringW
PostMessageW
Sections
.text Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 80B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 416B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 4KB - Virtual size: 288B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xdata Size: 4KB - Virtual size: 340B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 352B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52KB - Virtual size: 49KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE