Static task
static1
Behavioral task
behavioral1
Sample
ad90d05c3d62fc401798c5d1382436774eda856529810b848b580bed7842dac4.exe
Resource
win10v2004-20230220-en
General
-
Target
ad90d05c3d62fc401798c5d1382436774eda856529810b848b580bed7842dac4
-
Size
3.4MB
-
MD5
9b56633078c7a9f4a40e052fc99da351
-
SHA1
6af093746d14c152c5d2cd02a48daae19c71a5ed
-
SHA256
ad90d05c3d62fc401798c5d1382436774eda856529810b848b580bed7842dac4
-
SHA512
d0e015621c45836cbf47af3502c9d568d01efab315f674dc3707d436b867ced99685ad6146e868afe3735876cb118c2dff6f9bf8c58400f888463d5249f10064
-
SSDEEP
98304:sAzlCdanY66j2rT3LhfkiCCelGIr6Vis0PMN/06a:sa0t2LKi6lG3Is0q0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ad90d05c3d62fc401798c5d1382436774eda856529810b848b580bed7842dac4
Files
-
ad90d05c3d62fc401798c5d1382436774eda856529810b848b580bed7842dac4.exe windows x86
f4492804ef800c5af0eb5787c534d586
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualQuery
GetCommState
ReadConsoleA
InterlockedDecrement
CreateJobObjectW
InterlockedCompareExchange
AddConsoleAliasW
GetProcessPriorityBoost
GetConsoleAliasesLengthA
GetConsoleTitleA
GetWindowsDirectoryA
InitializeCriticalSection
GlobalAlloc
IsValidLocale
GetLocaleInfoW
FatalAppExitW
IsBadCodePtr
GetSystemWindowsDirectoryA
GetVersionExW
GlobalFlags
FindNextVolumeW
GetConsoleAliasW
ReplaceFileW
IsDBCSLeadByte
CreateActCtxA
GetTempPathW
GetStringTypeExA
AllocConsole
GetStdHandle
GetLogicalDriveStringsA
OpenMutexW
GetLastError
BindIoCompletionCallback
GetProcAddress
AttachConsole
VirtualAlloc
GetTempFileNameA
LoadLibraryA
DnsHostnameToComputerNameA
CreateFileMappingW
VirtualLock
GetTapeParameters
GetModuleFileNameA
GetDefaultCommConfigA
FindFirstVolumeMountPointA
GetModuleHandleA
HeapSetInformation
GetConsoleTitleW
WaitForDebugEvent
_lopen
FindAtomW
AddConsoleAliasA
ReadConsoleOutputCharacterW
EnumCalendarInfoExA
lstrlenA
GetDateFormatW
SetThreadContext
WideCharToMultiByte
InterlockedIncrement
InterlockedExchange
MultiByteToWideChar
Sleep
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
GetStartupInfoA
GetCPInfo
RtlUnwind
RaiseException
LCMapStringW
LCMapStringA
GetStringTypeW
HeapAlloc
HeapCreate
VirtualFree
HeapReAlloc
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
ExitProcess
WriteFile
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetStringTypeA
HeapSize
GetACP
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
InitializeCriticalSectionAndSpinCount
user32
CharLowerBuffW
gdi32
GetCharWidthW
GetCharABCWidthsFloatW
EnumFontsA
Sections
.text Size: 3.3MB - Virtual size: 3.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 2.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 83KB - Virtual size: 83KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 21KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ