Static task
static1
Behavioral task
behavioral1
Sample
aff8d33bae045722ffed6e567006c6be52cc55ad1fc79b78ea2f52d55156e30e.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
aff8d33bae045722ffed6e567006c6be52cc55ad1fc79b78ea2f52d55156e30e.exe
Resource
win10v2004-20240802-en
General
-
Target
aff8d33bae045722ffed6e567006c6be52cc55ad1fc79b78ea2f52d55156e30e.exe
-
Size
280KB
-
MD5
6171efb98ce36e0d0f9e6a416c15afb8
-
SHA1
6c740e01e6e235473c5d7fae6ed6a1ef46335ae4
-
SHA256
aff8d33bae045722ffed6e567006c6be52cc55ad1fc79b78ea2f52d55156e30e
-
SHA512
32e74bb14a2a2ca8e76b5883b6d0e36865651fed8e996c3f6ba6f3b42354c8e624bee248d5efe2727af3d5c06e7f3c8abc69990d1939fb9ee8ac1d32413848e7
-
SSDEEP
6144:gFua96dWR7Q/RiefxoxewWpP0Yoh883sADH0pQDnnTpL5:VaIdWRcpZJoEwgfO3Yp+nTpL
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource aff8d33bae045722ffed6e567006c6be52cc55ad1fc79b78ea2f52d55156e30e.exe
Files
-
aff8d33bae045722ffed6e567006c6be52cc55ad1fc79b78ea2f52d55156e30e.exe.exe windows:5 windows x86 arch:x86
d78a57f64a14336a30fd7584cb307da1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedDecrement
GetCurrentProcess
GetLogicalDriveStringsW
InterlockedCompareExchange
SetVolumeMountPointW
GetModuleHandleW
CreateNamedPipeW
FindNextVolumeMountPointA
GetNumberFormatA
CreateActCtxW
TlsSetValue
SetFileShortNameW
LoadLibraryW
LocalShrink
GetLocaleInfoW
GetCalendarInfoA
SetConsoleCP
GetFileAttributesW
GetModuleFileNameW
GetShortPathNameA
CreateJobObjectA
LCMapStringA
VerifyVersionInfoW
InterlockedExchange
GlobalUnfix
GetLastError
SetLastError
GetProcAddress
EnumSystemCodePagesW
GetConsoleDisplayMode
SetComputerNameA
LoadModule
SetThreadPriorityBoost
GetCommState
GetFileType
CreateFileMappingW
CreateHardLinkW
GetNumberFormatW
CreateEventW
FoldStringA
SetEnvironmentVariableA
EnumDateFormatsA
GetProcessShutdownParameters
LoadLibraryExA
VirtualProtect
GetCurrentDirectoryA
GetFileTime
OpenEventW
PeekConsoleInputA
SetCalendarInfoA
GetVersionExA
GetDiskFreeSpaceExW
GetWindowsDirectoryW
DebugBreak
GetTempPathA
EnumCalendarInfoExA
CommConfigDialogW
RaiseException
RtlUnwind
IsProcessorFeaturePresent
GetStringTypeW
LCMapStringW
GetConsoleAliasExesLengthA
SetEndOfFile
GetConsoleAliasExesA
EnumCalendarInfoA
GlobalMemoryStatus
LocalAlloc
SetDefaultCommConfigA
WideCharToMultiByte
HeapFree
HeapAlloc
MultiByteToWideChar
EncodePointer
DecodePointer
HeapReAlloc
GetCommandLineW
HeapSetInformation
GetStartupInfoW
HeapCreate
ExitProcess
WriteFile
GetStdHandle
GetCPInfo
InterlockedIncrement
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsFree
GetCurrentThreadId
Sleep
HeapSize
SetUnhandledExceptionFilter
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
UnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
LeaveCriticalSection
EnterCriticalSection
user32
CharUpperA
SetCaretPos
LoadMenuA
GetMenuStringW
GetWindowLongW
InsertMenuItemW
GetMenu
DrawStateW
gdi32
GetCharWidthFloatA
CreateDCA
DeleteMetaFile
GetCharWidth32A
GetTextMetricsA
GetBkMode
ole32
CoUnmarshalHresult
Sections
.text Size: 221KB - Virtual size: 220KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 22KB - Virtual size: 32.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.fuxi Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.jebirad Size: 512B - Virtual size: 214B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.fekif Size: 1024B - Virtual size: 923B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.ferohi Size: 1024B - Virtual size: 1024B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ