Static task
static1
Behavioral task
behavioral1
Sample
a024a9aba4f96ab9d1a8a0d64c0ac4db75744d381febefc34f3a1eac6b73a1ae.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
a024a9aba4f96ab9d1a8a0d64c0ac4db75744d381febefc34f3a1eac6b73a1ae.exe
Resource
win10v2004-20240802-en
General
-
Target
a024a9aba4f96ab9d1a8a0d64c0ac4db75744d381febefc34f3a1eac6b73a1ae
-
Size
861KB
-
MD5
f5157554b0a5094f3aeb7d7544732cd6
-
SHA1
567e027a824ade580fcf0d0a531449be8eb5a11e
-
SHA256
a024a9aba4f96ab9d1a8a0d64c0ac4db75744d381febefc34f3a1eac6b73a1ae
-
SHA512
bf5f52328ae8dea1fd3ece24a9fbfac8c98fa1af35ed874438f1e9316758eb54dabc67c666757e825617e242035ce069c06d9d339f076a97d0ff5d4b0e190c79
-
SSDEEP
12288:opeN5P/MZxOJ7fHLSssIuvqfkp1oznZuSd:yexfLstvJsZuSd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a024a9aba4f96ab9d1a8a0d64c0ac4db75744d381febefc34f3a1eac6b73a1ae
Files
-
a024a9aba4f96ab9d1a8a0d64c0ac4db75744d381febefc34f3a1eac6b73a1ae.exe windows:4 windows x64 arch:x64
c56970d10552db0701ef3a2a516d4b7a
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
advapi32
RegCloseKey
RegCreateKeyExW
RegGetValueW
RegOpenKeyW
RegQueryValueExW
RegSetValueExA
RegSetValueExW
gdi32
CreateCompatibleDC
CreateDIBSection
CreateFontIndirectW
DeleteDC
DeleteObject
GetDeviceCaps
GetTextExtentPointA
GetTextExtentPointW
GetTextMetricsW
SelectObject
SetBkMode
SetTextColor
kernel32
CloseHandle
CompareStringW
CreateEventW
CreateFileW
CreateMutexW
CreateProcessW
CreateThread
DelayLoadFailureHook
DuplicateHandle
EnterCriticalSection
ExitProcess
ExpandEnvironmentStringsW
FindClose
FindFirstFileW
FindNextFileW
FreeLibrary
GetCommandLineW
GetFullPathNameW
GetModuleHandleW
GetOverlappedResult
GetProcAddress
GetStartupInfoW
GetTickCount
HeapAlloc
HeapReAlloc
InitializeCriticalSection
IsBadStringPtrA
IsBadStringPtrW
LeaveCriticalSection
LoadLibraryW
MapViewOfFile
MulDiv
MultiByteToWideChar
OpenProcess
ReadDirectoryChangesW
ResolveDelayLoadedAPI
UnmapViewOfFile
WaitForMultipleObjects
WaitForSingleObject
lstrcmpiW
ntdll
_vsnprintf
rpcrt4
UuidCreate
ucrtbase
__acrt_iob_func
__p___argc
__p___wargv
__stdio_common_vsprintf
__stdio_common_vswprintf
_assert
_configure_wide_argv
_get_initial_wide_environment
_initialize_wide_environment
_set_app_type
_strdup
_wcsicmp
calloc
exit
free
fwrite
getenv
iswspace
malloc
memcmp
memcpy
memmove
memset
realloc
strchr
strcmp
strcspn
strlen
wcschr
wcscmp
wcscpy
wcslen
wcsncmp
wcstoul
user32
AdjustWindowRect
AppendMenuW
BeginPaint
ChangeDisplaySettingsExW
ClientToScreen
ClipCursor
CopyIcon
CreateDesktopW
CreateIcon
CreatePopupMenu
CreateWindowExW
DefWindowProcW
DestroyIcon
DestroyMenu
DestroyWindow
DispatchMessageW
DrawCaptionTempW
DrawFrameControl
DrawIconEx
DrawTextW
EndPaint
EnumDisplayDevicesW
EnumDisplaySettingsExW
ExitWindowsEx
GetAncestor
GetClientRect
GetDC
GetDesktopWindow
GetForegroundWindow
GetMenuInfo
GetMenuItemCount
GetMenuItemInfoW
GetMessageW
GetProcessWindowStation
GetSystemMetrics
GetThreadDesktop
GetUserObjectInformationW
GetWindow
GetWindowLongPtrW
GetWindowLongW
GetWindowRect
GetWindowThreadProcessId
InsertMenuItemW
IntersectRect
InvalidateRect
IsIconic
IsWindowEnabled
IsWindowVisible
KillTimer
LoadCursorA
LoadCursorW
LoadIconW
LoadStringW
MessageBoxW
PaintDesktop
PostMessageW
PostQuitMessage
RegisterClassExW
RegisterClassW
ReleaseDC
SendMessageW
SendNotifyMessageW
SetCursor
SetForegroundWindow
SetMenuInfo
SetMenuItemInfoW
SetParent
SetThreadDesktop
SetTimer
SetWindowLongPtrW
SetWindowLongW
SetWindowPos
SetWindowTextW
ShowWindow
SubtractRect
SystemParametersInfoW
TrackPopupMenuEx
TranslateMessage
UnregisterClassW
UpdateLayeredWindow
UpdateWindow
win32u
NtUserMessageCall
Sections
.text Size: 64KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 768B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 1KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 576B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/4 Size: 4KB - Virtual size: 432B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/19 Size: 320KB - Virtual size: 319KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/31 Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/45 Size: 48KB - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/57 Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/70 Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/81 Size: 160KB - Virtual size: 157KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
/92 Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ