Static task
static1
Behavioral task
behavioral1
Sample
ad3bad991db0d1exeexeexeex.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
ad3bad991db0d1exeexeexeex.exe
Resource
win10v2004-20230703-en
General
-
Target
ad3bad991db0d1exeexeexeex.exe
-
Size
323KB
-
MD5
ad3bad991db0d186426b8811895575c8
-
SHA1
7ef0b3e6f80b165624432922e6eadb2ae97ee50b
-
SHA256
7437d3d5bb8336e3ff662eacdaefd14783a1dec3138758277eeb3ceb09670727
-
SHA512
bdb405713d3fc01f4b3637be940628ca57832282be69140a76e83fd323965389b7a959e0ca772c14be5a342a27bfc1ddedb169b139c8e4a956499e6ec8d190e8
-
SSDEEP
3072:1+aa4GRKMPxGd7f3dR68Ek+eAVDtyvhXcskEDHc46eSUHX53uIxKqAklJnl:1+uGACcfNRv+7YNkSc4rHBBKxk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ad3bad991db0d1exeexeexeex.exe
Files
-
ad3bad991db0d1exeexeexeex.exe.exe windows x86
e288207eda018c4320f220f2da86f0d2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
inet_ntoa
WSACleanup
connect
WSAStartup
select
htons
recv
socket
__WSAFDIsSet
closesocket
gethostbyname
send
getsockopt
inet_addr
user32
GetSystemMetrics
PostMessageW
advapi32
OpenProcessToken
shell32
SHGetSpecialFolderPathA
SHGetFolderPathA
netapi32
Netbios
kernel32
IsProcessorFeaturePresent
IsDebuggerPresent
UnhandledExceptionFilter
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
SetStdHandle
HeapCreate
GetCurrentThreadId
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
GetConsoleCP
GetConsoleMode
GetACP
GetOEMCP
IsValidCodePage
HeapSize
GetLocaleInfoW
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeW
HeapReAlloc
WriteConsoleW
SetEndOfFile
GetProcessHeap
EndUpdateResourceW
GetStartupInfoW
GetFileType
InitializeCriticalSectionAndSpinCount
SetHandleCount
GetEnvironmentStringsW
CreateFileA
SetFilePointer
WriteFile
ReadFile
CreateFileW
GetLastError
CloseHandle
Sleep
CreateThread
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
FlushFileBuffers
FindResourceA
FreeLibrary
LoadResource
UpdateResourceA
EnumResourceTypesA
SizeofResource
EnumResourceLanguagesA
SetLastError
BeginUpdateResourceW
LoadLibraryA
LockResource
BeginUpdateResourceA
UpdateResourceW
EnumResourceNamesA
EndUpdateResourceA
WideCharToMultiByte
MultiByteToWideChar
CreateProcessW
GetCurrentProcess
WaitForSingleObject
GetModuleHandleW
OpenProcess
LoadLibraryW
GetVersionExW
TerminateProcess
GetProcAddress
Process32FirstW
GetSystemInfo
GetModuleFileNameA
Process32NextW
CreateToolhelp32Snapshot
GetCommandLineA
InterlockedIncrement
InterlockedDecrement
EncodePointer
DecodePointer
InterlockedExchange
GetCommandLineW
HeapSetInformation
HeapFree
GetSystemTimeAsFileTime
HeapAlloc
RaiseException
RtlUnwind
LCMapStringW
GetCPInfo
SetUnhandledExceptionFilter
ExitProcess
GetStdHandle
GetModuleFileNameW
FreeEnvironmentStringsW
Sections
.text Size: 255KB - Virtual size: 254KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 45KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 14KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ