Static task
static1
Behavioral task
behavioral1
Sample
ae993afcdd074f17052dd986df447e13147bfda52221aaee75154cdbe55aff1e.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
ae993afcdd074f17052dd986df447e13147bfda52221aaee75154cdbe55aff1e.exe
Resource
win10v2004-20240426-en
General
-
Target
ae993afcdd074f17052dd986df447e13147bfda52221aaee75154cdbe55aff1e
-
Size
12.7MB
-
MD5
c8d7d80a2feb4c737e16a20b1f30934c
-
SHA1
8394e1e4a5c063cf387750db79820ab8bf99daa2
-
SHA256
ae993afcdd074f17052dd986df447e13147bfda52221aaee75154cdbe55aff1e
-
SHA512
4fef516d418e6308f632b10bbd90b3f08d665a3f17f77f212878b927cb524183907230efe7c7e4007c3f77f13b2bfee228963474ed32153d6c7823502d2f0b7d
-
SSDEEP
49152:w5Vkv1XV1IdR1M3BdGjkKUyk5vF3wBJwS0UI+Btvm2cBpHZgCqY4M4qeH0iKfR:waTIdR1qBdIkdvOBJwr+Hv+5gRqejyR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ae993afcdd074f17052dd986df447e13147bfda52221aaee75154cdbe55aff1e
Files
-
ae993afcdd074f17052dd986df447e13147bfda52221aaee75154cdbe55aff1e.exe windows:5 windows x86 arch:x86
507d6a7a6a8757e6843a1db6082c4163
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
oleaut32
VariantClear
SysAllocStringLen
SysFreeString
SysAllocString
SysStringLen
ole32
CoInitialize
CoCreateInstance
CoUninitialize
OleInitialize
user32
SetWindowTextW
InvalidateRect
EnableWindow
GetKeyState
GetFocus
SetFocus
SetDlgItemTextW
EndDialog
PostMessageW
MessageBoxW
GetMonitorInfoA
MonitorFromWindow
SystemParametersInfoW
MapDialogRect
GetParent
SetWindowLongW
GetWindowLongW
ScreenToClient
GetWindowRect
GetDlgItem
DialogBoxParamW
MoveWindow
ShowWindow
GetWindowTextLengthW
GetWindowTextW
SendMessageW
LoadStringW
EmptyClipboard
SetClipboardData
CloseClipboard
OpenClipboard
CharUpperW
LoadIconW
CheckDlgButton
IsDlgButtonChecked
SetTimer
KillTimer
LoadCursorW
SetCursor
shell32
SHGetFileInfoW
SHBrowseForFolderW
SHGetPathFromIDListW
SHGetMalloc
kernel32
GetModuleHandleExW
ExitProcess
RtlUnwind
TerminateProcess
InitializeSListHead
GetSystemTimeAsFileTime
QueryPerformanceCounter
GetStartupInfoW
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsDebuggerPresent
CreateSemaphoreW
CreateEventW
WaitForSingleObject
ReleaseSemaphore
ResetEvent
SetEvent
InitializeCriticalSection
lstrlenW
lstrcatW
IsProcessorFeaturePresent
VirtualFree
VirtualAlloc
SetPriorityClass
WaitForMultipleObjects
Sleep
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetStdHandle
GetProcessAffinityMask
GlobalMemoryStatus
GetSystemInfo
GetCurrentProcess
FileTimeToSystemTime
FileTimeToLocalFileTime
CompareFileTime
GlobalFree
GlobalAlloc
WriteFile
SetFilePointer
SetEndOfFile
ReadFile
GetFileSize
GetModuleHandleA
GetLogicalDriveStringsW
GetFileInformationByHandle
GetFileAttributesW
FindNextFileW
FindFirstFileW
FindClose
MoveFileW
GetModuleHandleW
GetSystemDirectoryW
GetTickCount
GetCommandLineW
GetVersionExW
FreeLibrary
GetProcAddress
LoadLibraryW
GetLastError
MultiByteToWideChar
GlobalUnlock
GlobalLock
GetModuleFileNameW
LoadLibraryExW
LocalFree
FormatMessageW
GetCurrentDirectoryW
CreateDirectoryW
CreateFileW
DeleteFileW
RemoveDirectoryW
SetFileAttributesW
SetFileTime
CloseHandle
SetLastError
GetCurrentProcessId
GetCurrentThreadId
msvcrt
memset
_CxxThrowException
memcpy
_except_handler3
__CxxFrameHandler
_amsg_exit
memcmp
wcscmp
strlen
free
realloc
malloc
_beginthreadex
_callnewh
_initterm
__p__commode
abort
_errno
?terminate@@YAXXZ
_XcptFilter
__getmainargs
_msize
__set_app_type
_ismbblead
_acmdln
_fmode
?_set_new_mode@@YAHH@Z
_control87
wcsstr
memmove
Sections
.text Size: 177KB - Virtual size: 177KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 338KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ