Static task
static1
Behavioral task
behavioral1
Sample
5a43ad438d5a776e1f20b940c9906deb6bddaeef4cf872b8813fc30529b1b845.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral2
Sample
5a43ad438d5a776e1f20b940c9906deb6bddaeef4cf872b8813fc30529b1b845.exe
Resource
win11-20240508-en
General
-
Target
5a43ad438d5a776e1f20b940c9906deb6bddaeef4cf872b8813fc30529b1b845
-
Size
309KB
-
MD5
aa8c50cf278d1b7aa506c9bbaea9cbc1
-
SHA1
edaacb9898ceb31f7b85da2f5eba6dd1bb94e44c
-
SHA256
5a43ad438d5a776e1f20b940c9906deb6bddaeef4cf872b8813fc30529b1b845
-
SHA512
cc3ab056590e6fbf286fb258d0e78ae22f2b314972e9632f74c455df9b8cec34e7cf32dd59c4d584b4cd9a5d797c16917e2db35eb2bebe2e78f78f44ecc73196
-
SSDEEP
3072:VNmfWLCZzAm+5mctrFv5YNl6WDIjrDur5/4azPrhY7iiRri7u:VA+LYzD3kFeGjrDu9rz1Y7iGri
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 5a43ad438d5a776e1f20b940c9906deb6bddaeef4cf872b8813fc30529b1b845
Files
-
5a43ad438d5a776e1f20b940c9906deb6bddaeef4cf872b8813fc30529b1b845.exe windows:5 windows x86 arch:x86
40e7836f7f633991123ad84a6e7ca7c9
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommProperties
GetModuleHandleW
GetTickCount
EnumCalendarInfoExW
GetConsoleAliasesLengthA
ReadConsoleOutputA
GetUserDefaultLangID
GlobalAlloc
LoadLibraryW
lstrcpynW
LocalReAlloc
GetModuleFileNameW
RaiseException
GetConsoleAliasesW
InterlockedExchange
GetLastError
SetVolumeMountPointW
GetNumaHighestNodeNumber
LoadLibraryA
WriteConsoleA
AddAtomW
OpenJobObjectW
FoldStringW
GetCommTimeouts
lstrcatW
OpenFileMappingW
GetConsoleTitleW
BuildCommDCBA
FindFirstVolumeW
AreFileApisANSI
GlobalAddAtomA
CreateJobObjectW
GetProcAddress
GetComputerNameA
CloseHandle
CreateFileA
MultiByteToWideChar
HeapAlloc
Sleep
ExitProcess
GetStartupInfoW
RtlUnwind
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapFree
GetCPInfo
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualFree
VirtualAlloc
HeapReAlloc
HeapCreate
WriteFile
GetStdHandle
GetModuleFileNameA
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
FlushFileBuffers
HeapSize
InitializeCriticalSectionAndSpinCount
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
GetConsoleOutputCP
WriteConsoleW
SetFilePointer
SetStdHandle
ReadFile
user32
LoadIconA
gdi32
GetCharWidth32W
advapi32
EnumDependentServicesW
ole32
CoTaskMemFree
Sections
.text Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 114KB - Virtual size: 113KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 15KB - Virtual size: 34.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 127KB - Virtual size: 127KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ