Behavioral task
behavioral1
Sample
AdoPPrCC.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
AdoPPrCC.exe
Resource
win10v2004-20220812-en
General
-
Target
AdoPPrCC.7z
-
Size
1.4MB
-
MD5
97270869235c5c49c68d3c2458a08c98
-
SHA1
4421c42c72827b4f9c27315c2308c9a25525e4a1
-
SHA256
29d3dd3546a98286c0e6c3d6e1cd11850fe9494e894e92f7db9b6af840c55c98
-
SHA512
cfed9ef27e14bf95b8743d39966690c9feff69dba423e97cb7f1fbf4112e831ba63ab5a78ddb8ab21dd077df8849887eae2c5f9484360688a1db985540696a7d
-
SSDEEP
24576:NypParui/AQ6QYW33lR/aMBXA86X22nrq8p6yl/Zs:Nyp+uiMvk3ljXImEWQn1C
Malware Config
Signatures
-
resource yara_rule static1/unpack001/AdoPPrCC.exe aspack_v212_v242
Files
-
AdoPPrCC.7z.7z
Password: infected
-
AdoPPrCC.exe.exe windows x86
Password: infected
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 267KB - Virtual size: 568KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 55KB - Virtual size: 192KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.0MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 21KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Yaron Size: 57KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE