Static task
static1
Behavioral task
behavioral1
Sample
H7L-ESP-AIO.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
H7L-ESP-AIO.exe
Resource
win10v2004-20240709-en
General
-
Target
H7L-ESP-AIO.exe
-
Size
6.4MB
-
MD5
8ff070caf77c1ffea6fb2fb1e1992f65
-
SHA1
17f0d56d0292cb3625fecf8cd38c76f0464a1d57
-
SHA256
149fd117819179e0cc64ad64ae38dab9311fe2ed3fc14c1d4ddc04b4ea7d1ac1
-
SHA512
129bcecda2705e2956afbd0746c5bbf6a02d1c96ea8842162c6d03cb5257345af03488fb3f890cabf0b1662c0ecf6da41b75eb708db9d1fa4adf7b80e0f5c4b9
-
SSDEEP
196608:oG1fu9IT/CwzZzklyzevG5NpAFEOih8c:oGFu9CFzklwYKpAAN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource H7L-ESP-AIO.exe
Files
-
H7L-ESP-AIO.exe.exe windows:6 windows x64 arch:x64
14f94072c70ce55a28131a8ee367a793
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
LoadLibraryA
GetVersion
LocalAlloc
LocalFree
GetModuleFileNameW
ExitProcess
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
UnhookWindowsHookEx
CharUpperBuffW
shell32
ShellExecuteW
msvcp140
?_Lock@?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAAXXZ
ntdll
RtlLookupFunctionEntry
normaliz
IdnToAscii
wldap32
ord217
crypt32
CertFreeCertificateChain
ws2_32
ntohl
psapi
GetModuleInformation
userenv
UnloadUserProfile
vcruntime140_1
__CxxFrameHandler4
vcruntime140
__std_terminate
api-ms-win-crt-string-l1-1-0
strncpy
api-ms-win-crt-runtime-l1-1-0
_register_thread_local_exe_atexit_callback
api-ms-win-crt-stdio-l1-1-0
fgetc
api-ms-win-crt-time-l1-1-0
_mktime64
api-ms-win-crt-heap-l1-1-0
calloc
api-ms-win-crt-utility-l1-1-0
srand
api-ms-win-crt-filesystem-l1-1-0
_fstat64
api-ms-win-crt-convert-l1-1-0
strtoul
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-locale-l1-1-0
___lc_codepage_func
advapi32
AddAccessAllowedAce
Sections
.text Size: - Virtual size: 454KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 227KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 147KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.fAA Size: - Virtual size: 3.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.Mxf Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.B!F Size: 6.3MB - Virtual size: 6.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 236B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ