Static task
static1
Behavioral task
behavioral1
Sample
aeaaf3d79014969fe7fe2284a346c3f0N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
aeaaf3d79014969fe7fe2284a346c3f0N.exe
Resource
win10v2004-20240802-en
General
-
Target
aeaaf3d79014969fe7fe2284a346c3f0N.exe
-
Size
4.8MB
-
MD5
aeaaf3d79014969fe7fe2284a346c3f0
-
SHA1
6234e834aacdf09650ff8a88819f9f6531f80d2f
-
SHA256
7e8555c317a4541140e26e41f7a60dc3cf7bf49058525e3caf5984c96b33bd5c
-
SHA512
e996a930d94846fcd2fb880c5aa8ff789f60b52fe205f857acfeae149c061e7afb8becbef857baba288a33f54a546e1335d84490c3383abbe0938a65cb165633
-
SSDEEP
98304:eSvFMyQ7XkO8ifzBrVT+O7aKO70ULdeWdxSbztKFv:BFMdVlp+9aS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource aeaaf3d79014969fe7fe2284a346c3f0N.exe
Files
-
aeaaf3d79014969fe7fe2284a346c3f0N.exe.exe windows:5 windows x86 arch:x86
64ffa92ac058bc88e4d0493c8b840b86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetSystemDirectoryW
SetFirmwareEnvironmentVariableW
MoveFileExW
GetShortPathNameW
GetProcAddress
GetModuleHandleW
FindVolumeClose
FindNextVolumeW
QueryDosDeviceW
FindFirstVolumeW
GetDriveTypeW
LocalFree
GetCommandLineW
FreeLibrary
FormatMessageW
UnhandledExceptionFilter
WaitForSingleObject
GetCurrentThread
SetUnhandledExceptionFilter
ReleaseMutex
CreateMutexW
OpenMutexW
GetVersionExW
LeaveCriticalSection
FlushFileBuffers
LockResource
SizeofResource
LoadResource
FindResourceW
GetFileAttributesW
GetLogicalDrives
GetCurrentProcessId
QueryPerformanceCounter
QueryPerformanceFrequency
SetThreadPriority
GetSystemInfo
EnterCriticalSection
DeleteCriticalSection
SetCurrentDirectoryW
GetTempPathW
LoadLibraryW
SetErrorMode
InitializeCriticalSection
GetWindowsDirectoryW
InterlockedExchangeAdd
InterlockedExchange
SetEvent
ResetEvent
CreateEventW
SetEndOfFile
DeleteVolumeMountPointW
GetFileAttributesExW
GetStartupInfoW
GetProcessWorkingSetSize
GetProcessTimes
GetThreadTimes
GlobalMemoryStatus
GetProcessHeap
GetFirmwareEnvironmentVariableW
SetEnvironmentVariableA
CompareStringW
IsValidLocale
EnumSystemLocalesA
GetLocaleInfoA
GetUserDefaultLCID
GetEnvironmentStringsW
FreeEnvironmentStringsW
PeekNamedPipe
GetFullPathNameW
WriteConsoleW
HeapReAlloc
SetHandleCount
LCMapStringW
HeapSize
GetStringTypeW
IsValidCodePage
GetOEMCP
GetACP
GetCPInfo
GetLocaleInfoW
GetTimeZoneInformation
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetStdHandle
HeapCreate
IsProcessorFeaturePresent
HeapSetInformation
FindFirstFileExW
FileTimeToLocalFileTime
GetConsoleMode
GetConsoleCP
TerminateProcess
IsDebuggerPresent
InitializeCriticalSectionAndSpinCount
SetStdHandle
SetFileAttributesW
CreateThread
ResumeThread
ExitThread
ExitProcess
RtlUnwind
EncodePointer
DecodePointer
GetSystemTimeAsFileTime
HeapAlloc
HeapFree
RaiseException
LoadLibraryA
LocalAlloc
DeleteFileW
CopyFileW
DefineDosDeviceW
GetVolumeNameForVolumeMountPointW
SetVolumeMountPointW
GetTickCount
GetModuleFileNameW
InterlockedCompareExchange
GetDiskFreeSpaceW
GetVolumePathNameW
GetDiskFreeSpaceExW
SetThreadExecutionState
GetFileSizeEx
GetFileTime
GetVolumeInformationW
Sleep
VirtualLock
SetFilePointerEx
VirtualUnlock
DeviceIoControl
SetLastError
SetProcessShutdownParameters
GetCurrentThreadId
InterlockedDecrement
InterlockedIncrement
FindFirstFileW
FindNextFileW
GetLastError
FindClose
UnmapViewOfFile
CreateFileMappingW
MapViewOfFile
GetFileInformationByHandle
GetSystemTime
GetLocalTime
GetFileSize
FileTimeToDosDateTime
FileTimeToSystemTime
WriteFile
SetFileTime
GetCurrentDirectoryW
CreateDirectoryW
DosDateTimeToFileTime
LocalFileTimeToFileTime
SystemTimeToFileTime
ReadFile
CloseHandle
CreateFileW
GetCurrentProcess
DuplicateHandle
GetFileType
SetFilePointer
MultiByteToWideChar
WideCharToMultiByte
user32
AppendMenuW
SendMessageTimeoutW
GetDesktopWindow
TrackMouseEvent
IsWindowEnabled
IsWindowVisible
RegisterClassExW
GetClassInfoW
SetLayeredWindowAttributes
ExitWindowsEx
SendDlgItemMessageW
GetFocus
GetWindowThreadProcessId
AttachThreadInput
AllowSetForegroundWindow
SetForegroundWindow
LoadImageW
GetKeyState
EnumChildWindows
GetDlgCtrlID
RegisterWindowMessageW
UnhookWindowsHookEx
CallNextHookEx
GetCursorPos
GetCaretPos
GetQueueStatus
GetProcessWindowStation
GetOpenClipboardWindow
GetMessageTime
GetMessagePos
CreateWindowExW
GetInputState
PostThreadMessageW
DispatchMessageW
TranslateMessage
GetMessageW
SetWindowTextW
PostMessageW
GetWindowTextW
SystemParametersInfoW
GetClipboardViewer
GetClipboardOwner
GetCapture
SetWindowsHookExW
GetForegroundWindow
GetClassNameW
LoadCursorW
SetCursor
DefDlgProcW
UnregisterClassW
LoadIconW
RegisterClassW
GetUpdateRect
BeginPaint
DefWindowProcW
GetDialogBaseUnits
EndPaint
LoadBitmapW
SetWindowLongW
CallWindowProcW
GetSystemMenu
EnableMenuItem
GetClientRect
GetSystemMetrics
GetWindowInfo
SetWindowPos
InvalidateRect
GetDC
ReleaseDC
MessageBoxA
GetActiveWindow
KillTimer
GetAsyncKeyState
DestroyWindow
GetWindowRect
CreateDialogParamW
MapDialogRect
MoveWindow
ShowWindow
GetKeyboardLayout
LoadKeyboardLayoutW
SetDlgItemTextW
GetWindowTextLengthW
GetDlgItemTextW
GetSysColorBrush
DialogBoxParamW
MessageBeep
SetTimer
GetParent
IsWindow
EndDialog
MessageBoxW
SetFocus
PeekMessageW
EnableWindow
GetDlgItem
SendMessageW
EnumWindows
GetWindowLongW
gdi32
CreateFontIndirectW
GetStockObject
CreatePen
MoveToEx
LineTo
GetCurrentObject
GetObjectW
CreateCompatibleBitmap
SetStretchBltMode
StretchBlt
DeleteDC
BitBlt
CreateCompatibleDC
DeleteObject
SetTextColor
SetBkMode
GetTextMetricsW
GetTextExtentPoint32W
SelectObject
SetMapMode
GetDeviceCaps
comdlg32
GetOpenFileNameW
GetSaveFileNameW
advapi32
CryptAcquireContextW
RegDeleteValueW
GetTokenInformation
IsWellKnownSid
RegCreateKeyExW
RegSetValueExW
RegDeleteKeyW
QueryServiceStatus
ControlService
StartServiceW
RegQueryValueExW
OpenProcessToken
LookupPrivilegeValueW
AdjustTokenPrivileges
RegOpenKeyExW
RegQueryValueExA
RegSetValueExA
CreateServiceW
ChangeServiceConfig2W
DeleteService
OpenSCManagerW
OpenServiceW
ChangeServiceConfigW
CryptReleaseContext
CryptGenRandom
CloseServiceHandle
RegCloseKey
shell32
DragQueryFileW
DragFinish
SHChangeNotify
ShellExecuteA
SHGetFileInfoW
ord680
SHGetMalloc
SHBrowseForFolderW
SHGetPathFromIDListW
CommandLineToArgvW
SHGetFolderPathW
ShellExecuteW
DragAcceptFiles
ole32
StringFromGUID2
CoGetObject
CoInitialize
CoUninitialize
CoRegisterClassObject
CoRevokeClassObject
CoCreateInstance
oleaut32
SysAllocStringLen
SysFreeString
SysStringByteLen
SysAllocString
SysAllocStringByteLen
Sections
.text Size: 722KB - Virtual size: 722KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 324KB - Virtual size: 324KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 27KB - Virtual size: 353KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3.8MB - Virtual size: 3.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ