Static task
static1
Behavioral task
behavioral1
Sample
ad3aeae191ca404eec6ae7618f74e4611dc03810938fae745da4b6733881cf48.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
ad3aeae191ca404eec6ae7618f74e4611dc03810938fae745da4b6733881cf48.exe
Resource
win10v2004-20230703-en
General
-
Target
ad3aeae191ca404eec6ae7618f74e4611dc03810938fae745da4b6733881cf48
-
Size
188KB
-
MD5
76397ef4b1a881a6f78afd46bc628bfb
-
SHA1
5c4e5b00c5d051b8af443b1563bf2862228fdb8c
-
SHA256
ad3aeae191ca404eec6ae7618f74e4611dc03810938fae745da4b6733881cf48
-
SHA512
54d2ccf0dec8f51b37d4df277cde44d0a22df2bd6c7df8404a2e108c3a2bcfc36baf3cbc4b7f7c7182a983f38b96b2a256a1f04a594446d5119520ef85fd8fec
-
SSDEEP
3072:8AmR2vvaJSfSO1T0AOFOdxBj5zyG2ozQDcSzp3BIo2nkP:8AmRDJiSqTDj5Oc8R1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ad3aeae191ca404eec6ae7618f74e4611dc03810938fae745da4b6733881cf48
Files
-
ad3aeae191ca404eec6ae7618f74e4611dc03810938fae745da4b6733881cf48.exe windows x86
2e3109e855834205b603691f4225e497
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ws2_32
setsockopt
inet_ntoa
closesocket
getsockopt
inet_addr
gethostbyname
WSAGetLastError
socket
sendto
recvfrom
kernel32
UnlockFile
SetEndOfFile
LockFile
GetVolumeInformationA
GetFullPathNameA
GetFileAttributesA
GetFileSize
GetFileTime
FileTimeToSystemTime
FileTimeToLocalFileTime
SetErrorMode
RtlUnwind
GetStartupInfoA
GetCommandLineA
ExitProcess
TerminateProcess
HeapFree
CreateThread
ExitThread
HeapAlloc
RaiseException
HeapReAlloc
HeapSize
GetACP
SetStdHandle
WriteFile
FlushFileBuffers
GetModuleHandleA
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
LCMapStringA
LCMapStringW
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadReadPtr
IsBadCodePtr
CompareStringA
CompareStringW
SetEnvironmentVariableA
SetFilePointer
GetCurrentProcess
ReadFile
CreateFileA
FindFirstFileA
DuplicateHandle
GetCPInfo
FindClose
GetOEMCP
SizeofResource
GetProcessVersion
WritePrivateProfileStringA
LocalReAlloc
GlobalFlags
TlsGetValue
TlsFree
TlsSetValue
GlobalReAlloc
LeaveCriticalSection
GlobalHandle
TlsAlloc
LocalAlloc
DeleteCriticalSection
InitializeCriticalSection
GetLastError
lstrcpynA
EnterCriticalSection
MulDiv
FormatMessageA
LocalFree
FreeLibrary
SetLastError
LoadLibraryA
GlobalGetAtomNameA
GetVersion
lstrcatA
lstrcpyA
GlobalAddAtomA
GlobalFindAtomA
GetFileType
GetProcAddress
GetProfileStringA
MultiByteToWideChar
WideCharToMultiByte
lstrlenA
InterlockedDecrement
InterlockedIncrement
GlobalUnlock
GlobalFree
LockResource
FindResourceA
LoadResource
CreateEventA
SuspendThread
SetThreadPriority
ResumeThread
SetEvent
WaitForSingleObject
CloseHandle
GetModuleFileNameA
GlobalLock
GlobalAlloc
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
GetTimeZoneInformation
GetCurrentThreadId
WinExec
Sleep
GetTickCount
GetCurrentProcessId
user32
GetCapture
WinHelpA
GetTopWindow
CopyRect
AdjustWindowRectEx
SetFocus
GetSysColor
MapWindowPoints
SendDlgItemMessageA
UpdateWindow
IsDialogMessageA
SetWindowTextA
ScreenToClient
ClientToScreen
GetDC
ReleaseDC
GetWindowDC
BeginPaint
EndPaint
TabbedTextOutA
DrawTextA
GrayStringA
LoadStringA
DestroyMenu
GetClassNameA
PtInRect
GetSysColorBrush
CharUpperA
InvalidateRect
ShowWindow
RegisterClassA
GetMenu
GetWindowTextA
GetDlgCtrlID
DefWindowProcA
CreateWindowExA
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
GetMessageTime
GetMessagePos
GetForegroundWindow
SetForegroundWindow
GetWindow
SetWindowLongA
SetWindowPos
RegisterWindowMessageA
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
EndDialog
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
GetDlgItem
GetMenuCheckMarkDimensions
LoadBitmapA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
IsWindowVisible
PeekMessageA
GetCursorPos
SetWindowsHookExA
GetParent
GetLastActivePopup
IsWindowEnabled
GetWindowLongA
MessageBoxA
PostQuitMessage
PostMessageA
EnableWindow
LoadCursorA
SetCursor
SetTimer
KillTimer
IsIconic
GetSystemMetrics
GetClientRect
DrawIcon
GetSystemMenu
AppendMenuA
SendMessageA
GetWindowRect
LoadIconA
wsprintfA
GetWindowTextLengthA
GetMenuItemCount
GetSubMenu
GetMenuItemID
IsWindow
ModifyMenuA
GetMenuState
GetClassInfoA
ExcludeUpdateRgn
UnregisterClassA
HideCaret
ShowCaret
IsWindowUnicode
DrawFocusRect
DefDlgProcA
InflateRect
CharNextA
gdi32
GetTextExtentPointA
PatBlt
CreateCompatibleDC
CreateBitmap
GetClipBox
SetTextColor
SetBkColor
GetObjectA
DeleteDC
SaveDC
RestoreDC
SelectObject
GetStockObject
SetBkMode
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
IntersectClipRect
CreateDIBitmap
BitBlt
DeleteObject
GetDeviceCaps
CreateSolidBrush
PtVisible
RectVisible
ExtTextOutA
Escape
TextOutA
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
RegCreateKeyExA
RegSetValueExA
RegOpenKeyA
RegEnumValueA
RegOpenKeyExA
RegCloseKey
shell32
ShellExecuteA
comctl32
ord17
wsock32
WSAStartup
WSACleanup
wininet
InternetQueryDataAvailable
InternetGetLastResponseInfoA
InternetOpenA
InternetCloseHandle
InternetConnectA
InternetSetStatusCallback
InternetSetFilePointer
InternetWriteFile
InternetReadFile
FtpOpenFileA
Sections
.text Size: 108KB - Virtual size: 105KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ