Static task
static1
Behavioral task
behavioral1
Sample
adb63744e58a.exe
Resource
win10-20230220-en
Behavioral task
behavioral2
Sample
adb63744e58a.exe
Resource
win7-20230220-en
General
-
Target
adb63744e58a.exe
-
Size
11.1MB
-
MD5
be17ed9fe67a1544ce1283c909a62414
-
SHA1
7dee87e0af06e95650680296d10e6e9655fede72
-
SHA256
adb63744e58aac9dc0e9c126274eb0453b719e9abfc4406bc69f0e070e7bbebb
-
SHA512
658243d069de753f9536c38afadf7ecf4917959e068440adfa38de8d00603fdb3ec41a05c61fd36befa46c6c1def02fd1750af5becccffac75f4a90c7c35fbe5
-
SSDEEP
196608:hVx3FSNed7V+m48+3XF8vQMab0us8QA+BbzRaPe5BoIoJPf49aN38P+:h3FQ67VJ+3XFTMabZ+VzQPdIQI96
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource adb63744e58a.exe
Files
-
adb63744e58a.exe.exe windows x64
fc7467be4cab154f7d0421fc14befc70
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
GetLastError
GetSystemTimeAsFileTime
HeapAlloc
HeapFree
ExitProcess
LoadLibraryA
GetModuleHandleA
GetProcAddress
user32
GetClipboardData
CharUpperBuffW
advapi32
RegCloseKey
Sections
.text Size: - Virtual size: 936KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 169KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 66KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: - Virtual size: 244B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
YNJTGDFV Size: - Virtual size: 6.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
YNJTGDFV Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
YNJTGDFV Size: 11.1MB - Virtual size: 11.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ