Static task
static1
Behavioral task
behavioral1
Sample
adbe7a6a87ed8acc591a850031d9dfd8f70399a5bee4d749ebd68d120d195695.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
adbe7a6a87ed8acc591a850031d9dfd8f70399a5bee4d749ebd68d120d195695.exe
Resource
win10-20230703-en
General
-
Target
adbe7a6a87ed8acc591a850031d9dfd8f70399a5bee4d749ebd68d120d195695
-
Size
321KB
-
MD5
30ff060017187bb4b3d03a131a07182b
-
SHA1
4e3d0cace04c9de5041f5c947cacfb2ffc57cfe4
-
SHA256
adbe7a6a87ed8acc591a850031d9dfd8f70399a5bee4d749ebd68d120d195695
-
SHA512
23343e03f7c5752effedfb842e71ab7852de3f55267728130e67d0e8cab8f9af97d2abe4a41f0261ce6e9580e1fce1204b677f62a764b64749a856c1768e2103
-
SSDEEP
3072:7bLJL7l1YVVVlFhjHUMeLGN/pKHojv7URsR9iFITEFDRFMWjkK9:7hh1YVVnnU/C1MOjhv8FDT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource adbe7a6a87ed8acc591a850031d9dfd8f70399a5bee4d749ebd68d120d195695
Files
-
adbe7a6a87ed8acc591a850031d9dfd8f70399a5bee4d749ebd68d120d195695.exe windows x86
dedd1d0ad9fa52e6d98ddb7809d110ce
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommandLineW
SetInformationJobObject
GetConsoleAliasesLengthW
GetConsoleAliasExesA
GetConsoleAliasExesLengthA
DeleteVolumeMountPointA
MoveFileExW
InterlockedDecrement
WaitNamedPipeA
GetCurrentProcess
GetNamedPipeHandleStateA
SetHandleInformation
GetProfileStringW
GetComputerNameW
GetTimeFormatA
FlushConsoleInputBuffer
GetSystemDefaultLCID
FreeEnvironmentStringsA
_lclose
_lcreat
GetModuleHandleW
GetNumberFormatA
EnumTimeFormatsW
GetUserDefaultLangID
GetCommandLineA
GetDriveTypeA
GlobalAlloc
GetPrivateProfileIntA
GetSystemDirectoryW
SetFileShortNameW
LoadLibraryW
TerminateThread
ReadConsoleInputA
_hread
GetCalendarInfoW
SetConsoleCP
GetConsoleAliasW
IsDBCSLeadByte
GetStartupInfoW
CreateMailslotW
SetCurrentDirectoryA
GetLastError
GetCurrentDirectoryW
SetLastError
GetProcAddress
HeapSize
BackupWrite
MoveFileW
SetComputerNameA
OpenWaitableTimerW
GetFileType
MoveFileA
BuildCommDCBAndTimeoutsW
SetConsoleCtrlHandler
GlobalGetAtomNameW
GetPrivateProfileStructA
FindNextFileA
CreateIoCompletionPort
_lread
GetModuleHandleA
OpenFileMappingW
GetProcessAffinityMask
FindNextFileW
VirtualProtect
EnumDateFormatsW
GetConsoleCursorInfo
FatalAppExitA
PeekConsoleInputA
OpenSemaphoreW
FindFirstVolumeA
LocalSize
GetWindowsDirectoryW
GetVolumeNameForVolumeMountPointW
DeleteFileW
ReadConsoleOutputCharacterW
EnumSystemLocalesW
CloseHandle
ReadFile
WriteConsoleW
InterlockedIncrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
EncodePointer
DecodePointer
HeapFree
HeapAlloc
DeleteFileA
ExitProcess
HeapSetInformation
RtlUnwind
HeapCreate
WriteFile
GetStdHandle
GetModuleFileNameW
SetFilePointer
SetHandleCount
InitializeCriticalSectionAndSpinCount
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
RaiseException
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetStringTypeW
MultiByteToWideChar
IsProcessorFeaturePresent
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
HeapReAlloc
LCMapStringW
CreateFileW
user32
CharUpperBuffA
CharUpperA
Sections
.text Size: 155KB - Virtual size: 154KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 77KB - Virtual size: 30.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 88KB - Virtual size: 87KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ