Static task
static1
Behavioral task
behavioral1
Sample
aa03bacd4c0f14787c416007b5b5e060N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
aa03bacd4c0f14787c416007b5b5e060N.exe
Resource
win10v2004-20240802-en
General
-
Target
aa03bacd4c0f14787c416007b5b5e060N
-
Size
2.3MB
-
MD5
aa03bacd4c0f14787c416007b5b5e060
-
SHA1
0a4928b54f14a413bb794a7d58440f71bb6ace42
-
SHA256
b5200a9431416b1110f06a6851a4936c43c2879264e30958d23f52f2bfe93466
-
SHA512
f11f2357557ea7b4227414dc090caea38ee7479e5c8cbd4f5beaaf6f2064d4d090e9e14ffa4e972b469f0e6186287960ab7fcb7ed210220b9c9fc406307634e1
-
SSDEEP
6144:K3F/5OIDY4PAZbeG75QDvwxbmE7mkt7DWEHfyX+A6zcoKghx:aF/QIDY4ItV75nxqE7JWyQ+4o9h
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource aa03bacd4c0f14787c416007b5b5e060N
Files
-
aa03bacd4c0f14787c416007b5b5e060N.exe windows:5 windows x64 arch:x64
6d5cba4ea08624857ff2ddd23ca4449e
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
shlwapi
PathRemoveBackslashA
wintrust
WinVerifyTrust
WTHelperGetProvSignerFromChain
WTHelperProvDataFromStateData
crypt32
CertGetNameStringA
kernel32
GetCommandLineW
lstrlenW
CreateMutexA
ReleaseMutex
lstrcatA
InitializeCriticalSectionAndSpinCount
FindFirstFileA
FindNextFileA
FindClose
GetDriveTypeA
IsDBCSLeadByte
GetCurrentProcess
GetCurrentProcessId
OpenProcess
VerSetConditionMask
VerifyVersionInfoA
GetModuleFileNameA
ExpandEnvironmentStringsA
FlushFileBuffers
SetFilePointerEx
GetConsoleMode
GetConsoleCP
HeapReAlloc
HeapSize
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
IsValidCodePage
FindFirstFileExA
GetStringTypeW
LCMapStringW
GetFileType
GetACP
ExitProcess
WideCharToMultiByte
GetStdHandle
GetCommandLineA
GetModuleHandleExW
FreeLibraryAndExitThread
ResumeThread
ExitThread
CreateThread
LoadLibraryExW
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
RtlUnwindEx
RaiseException
EncodePointer
RtlPcToFileHeader
GetModuleHandleW
GetStartupInfoW
IsDebuggerPresent
GetModuleFileNameW
GetComputerNameW
GetVersionExA
GetLocalTime
CreateFileA
GetPrivateProfileStringA
lstrcpynA
GetExitCodeProcess
InitializeSListHead
GetSystemTimeAsFileTime
WaitForSingleObject
SetLastError
CreateProcessA
lstrcmpA
FreeLibrary
GetProcAddress
LoadLibraryA
lstrlenA
MultiByteToWideChar
lstrcpyA
Sleep
WriteFile
CloseHandle
CreateFileW
SetFilePointer
lstrcmpiA
GetLastError
HeapFree
GetProcessHeap
HeapAlloc
GetCurrentThreadId
QueryPerformanceCounter
IsProcessorFeaturePresent
TerminateProcess
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
VirtualAlloc
user32
GetWindowLongPtrA
SetCursor
LoadCursorA
MessageBoxA
EndDialog
wsprintfA
SetDlgItemTextA
IsWindow
PostMessageA
SetWindowLongPtrA
DialogBoxParamA
GetWindowTextW
GetDlgItem
ScreenToClient
LoadIconA
GetWindowTextA
SetWindowTextA
CheckDlgButton
GetParent
IsDlgButtonChecked
DrawMenuBar
GetSystemMenu
EnableMenuItem
SetWindowPos
GetWindow
MoveWindow
GetSystemMetrics
OffsetRect
EnableWindow
CharPrevA
ExitWindowsEx
CharNextA
GetWindowRect
SetPropA
RemovePropA
CallWindowProcA
DefWindowProcA
GetPropA
DrawFocusRect
FillRect
GetClientRect
GetFocus
DrawTextExA
DrawFrameControl
GetKeyState
SendMessageA
GetSysColor
GetSysColorBrush
GetDlgCtrlID
ShowWindow
IsIconic
SetForegroundWindow
GetLastActivePopup
FindWindowA
SendDlgItemMessageA
wsprintfW
gdi32
RestoreDC
DeleteObject
GetTextColor
CreateSolidBrush
SetBkMode
SaveDC
SetTextColor
SetBkColor
winspool.drv
EnumPrintersA
advapi32
OpenProcessToken
FreeSid
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
RegCreateKeyExA
RegSetValueExA
GetTokenInformation
LookupAccountSidA
EqualSid
AdjustTokenPrivileges
LookupPrivilegeValueA
AllocateAndInitializeSid
CreateProcessWithLogonW
ControlService
QueryServiceStatus
ChangeServiceConfigA
StartServiceA
OpenServiceA
OpenSCManagerA
CloseServiceHandle
shell32
SHBrowseForFolderA
SHGetPathFromIDListA
SHGetMalloc
SHCreateDirectoryExA
SHGetFolderPathA
SHGetSpecialFolderLocation
ole32
CoInitializeEx
CoCreateInstance
CoUninitialize
CoTaskMemFree
Sections
.text Size: 130KB - Virtual size: 129KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 64KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 63KB - Virtual size: 71KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.gfids Size: 512B - Virtual size: 228B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ