Static task
static1
Behavioral task
behavioral1
Sample
Order_pdf.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
Order_pdf.exe
Resource
win10v2004-20230703-en
General
-
Target
Order_pdf.exe
-
Size
499KB
-
MD5
2881c642fff830480f98b5fb39905739
-
SHA1
36930668689e571914c0c77fc98dc3eb2d9f46a6
-
SHA256
547c18da09aa11143e35bbb978f5b166a3f0c71fb3d283b81a6ba4ddc4438605
-
SHA512
d628bd7a9244eec29f37abf5fb94ea98302a18e63564b696136a0f83743818e9f677fd464e33366f4f2f8a913645540af808ca5a86856b94617d81ca66747e44
-
SSDEEP
6144:6ocLlu5i+q3m1xsgq0ncGtWoMdA3OKt+O6HAm+ThfP6c0Dqdz/Vb6eRuD7T:6LJu5OaeR0cuHKA3OKAuNOAzTRIv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Order_pdf.exe
Files
-
Order_pdf.exe.exe windows x86
1ef9b36848c22fc248776468fce46241
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EnumCalendarInfoA
GetProfileIntW
GetSystemWindowsDirectoryW
GetComputerNameW
CreateHardLinkA
LockFile
GetModuleHandleW
GetTickCount
GetConsoleAliasesA
GetDateFormatA
FindResourceExA
ReadConsoleInputA
_hread
GetVersionExW
EnumSystemCodePagesA
FindNextVolumeW
Beep
GetVolumePathNameA
ReplaceFileA
DisconnectNamedPipe
FlushFileBuffers
SetCurrentDirectoryA
FindFirstFileA
SetLocaleInfoA
GetLastError
SetLastError
lstrcmpiA
GetProcAddress
GetLongPathNameA
EnumDateFormatsExA
HeapUnlock
CopyFileA
LoadLibraryA
LocalAlloc
BeginUpdateResourceA
SetProcessWorkingSetSize
CreateMutexA
VirtualProtect
GetVersionExA
GetWindowsDirectoryW
FileTimeToLocalFileTime
lstrcpyA
CloseHandle
CreateFileA
GetModuleHandleA
WriteConsoleW
GetConsoleOutputCP
OpenMutexW
FindResourceA
InterlockedIncrement
InterlockedDecrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
MultiByteToWideChar
GetStartupInfoW
HeapFree
RtlUnwind
RaiseException
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
TerminateProcess
GetCurrentProcess
IsDebuggerPresent
HeapAlloc
WideCharToMultiByte
SetHandleCount
GetFileType
GetStartupInfoA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
HeapSize
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
HeapCreate
VirtualFree
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
VirtualAlloc
HeapReAlloc
GetLocaleInfoA
GetStringTypeA
GetStringTypeW
InitializeCriticalSectionAndSpinCount
SetFilePointer
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
SetStdHandle
WriteConsoleA
user32
CharUpperBuffW
GetMenuBarInfo
CharLowerBuffW
DdeQueryStringA
GetClipboardOwner
CharToOemBuffA
advapi32
LogonUserW
Sections
.text Size: 361KB - Virtual size: 361KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 260KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 121KB - Virtual size: 121KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ