Static task
static1
Behavioral task
behavioral1
Sample
adac1c3f550db928d18dc9d867110894a986cf7fe8c36d686b21aac2620ed0ef.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
adac1c3f550db928d18dc9d867110894a986cf7fe8c36d686b21aac2620ed0ef.exe
Resource
win10v2004-20230915-en
General
-
Target
adac1c3f550db928d18dc9d867110894a986cf7fe8c36d686b21aac2620ed0ef
-
Size
4.3MB
-
MD5
b8bf51b7f76f51de3078b63e50beda47
-
SHA1
6c3f548bff81f18bf2e46cb40cf74476db244c4d
-
SHA256
adac1c3f550db928d18dc9d867110894a986cf7fe8c36d686b21aac2620ed0ef
-
SHA512
b29136c5fa5c7cb9e77dfd4c19d5f25d8cfc84d40c39f82b0a71b38f8e0642227f4dd0fbc9a5a7d0a8e364bfb3c1c0871e935eb69a6ef665353455b5a52916ab
-
SSDEEP
98304:tC2oLYMlXCweXe4nH7z7777W7+7777W77767777u7W7777W77d7776bCC17/7CjC:tmHeX3nH7z7777W7+7777W77767777uS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource adac1c3f550db928d18dc9d867110894a986cf7fe8c36d686b21aac2620ed0ef
Files
-
adac1c3f550db928d18dc9d867110894a986cf7fe8c36d686b21aac2620ed0ef.exe windows:5 windows x86
18ef538ebd1b192c2c56cfe1336ad52b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_AGGRESIVE_WS_TRIM
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
version
GetFileVersionInfoSizeA
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerFindFileA
VerFindFileW
VerInstallFileW
VerLanguageNameA
VerLanguageNameW
VerQueryValueA
VerQueryValueW
VerInstallFileA
kernel32
GetModuleHandleA
GetModuleHandleW
GetPriorityClass
GetProcAddress
GetProcessHeap
GetStartupInfoA
GetStdHandle
GetStringTypeExA
GetStringTypeExW
GetSystemDirectoryA
GetSystemTime
GetTempFileNameA
GetTempPathA
GetThreadContext
GetThreadLocale
GetThreadPriority
GetUserDefaultLCID
GetVersionExA
GetWindowsDirectoryA
GlobalAddAtomA
GlobalAlloc
GlobalDeleteAtom
GlobalFindAtomA
GlobalFree
GlobalHandle
GlobalLock
GlobalMemoryStatus
GlobalReAlloc
GlobalSize
GlobalUnlock
HeapAlloc
HeapFree
InitializeCriticalSection
InterlockedDecrement
InterlockedExchange
InterlockedIncrement
IsBadReadPtr
IsValidLocale
LeaveCriticalSection
LoadLibraryA
LoadLibraryExA
LoadResource
LocalFileTimeToFileTime
LocalSize
LockResource
lstrcmpA
lstrcpyA
lstrcpynA
lstrlenA
lstrlenW
MapViewOfFile
MoveFileA
MoveFileW
MulDiv
GetModuleFileNameW
OpenFileMappingA
OpenMutexW
OpenProcess
OutputDebugStringW
QueryPerformanceCounter
QueryPerformanceFrequency
RaiseException
ReadFile
ReadProcessMemory
ReleaseMutex
RemoveDirectoryA
RemoveDirectoryW
ResetEvent
ResumeThread
SetEndOfFile
SetErrorMode
SetEvent
SetFileAttributesA
SetFileAttributesW
SetFilePointer
SetFileTime
SetLastError
SetThreadLocale
SetThreadPriority
SetUnhandledExceptionFilter
SetVolumeLabelA
SizeofResource
Sleep
SuspendThread
SystemTimeToFileTime
TerminateProcess
TerminateThread
TlsGetValue
TlsSetValue
UnhandledExceptionFilter
UnmapViewOfFile
VirtualAlloc
VirtualFree
VirtualProtect
VirtualQuery
WaitForSingleObject
WideCharToMultiByte
IsValidCodePage
EnterCriticalSection
GetConsoleCP
GetModuleFileNameA
GetLocalTime
GetLastError
GetFullPathNameW
GetFullPathNameA
GetFileType
GetFileTime
GetFileSize
GetFileAttributesW
GetFileAttributesA
GetDriveTypeA
GetDiskFreeSpaceA
RtlUnwind
GetVersion
GetCurrentProcess
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetDateFormatA
GetCurrentDirectoryW
GetCurrentDirectoryA
GetCPInfo
GetComputerNameA
GetCommandLineW
GetCommandLineA
GetACP
FreeResource
FreeLibrary
FormatMessageW
FormatMessageA
FlushInstructionCache
FlushFileBuffers
FindResourceA
FindNextFileW
FindNextFileA
FindFirstFileW
FindFirstFileA
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
FileTimeToDosDateTime
ExpandEnvironmentStringsW
GetVersionExW
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
LocalAlloc
LocalFree
ExitProcess
HeapDestroy
HeapCreate
WriteFile
GetOEMCP
HeapReAlloc
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetStdHandle
MultiByteToWideChar
CloseHandle
user32
LoadStringA
MapVirtualKeyA
MapWindowPoints
MessageBeep
MessageBoxA
OemToCharA
OemToCharBuffA
OffsetRect
OpenClipboard
PeekMessageA
PeekMessageW
PostMessageA
PostQuitMessage
PostThreadMessageA
PtInRect
RedrawWindow
RegisterClassA
RegisterClipboardFormatA
RegisterWindowMessageA
RegisterWindowMessageW
ReleaseCapture
ReleaseDC
RemoveMenu
RemovePropA
ScreenToClient
ScrollWindow
SendMessageA
SendMessageTimeoutA
SendMessageW
SetActiveWindow
SetCapture
SetClassLongA
SetClipboardData
SetCursor
SetFocus
SetForegroundWindow
SetMenuItemInfoA
SetParent
SetPropA
SetRect
SetScrollInfo
SetScrollPos
SetScrollRange
SetTimer
SetWindowLongA
SetWindowLongW
SetWindowPlacement
SetWindowPos
SetWindowsHookExA
SetWindowTextA
ShowOwnedPopups
ShowScrollBar
ShowWindow
SystemParametersInfoA
TrackPopupMenu
TranslateMDISysAccel
TranslateMessage
UnhookWindowsHookEx
UnregisterClassA
UpdateWindow
WaitMessage
WindowFromPoint
LoadKeyboardLayoutA
LoadImageA
LoadIconA
LoadCursorA
LoadBitmapA
KillTimer
IsZoomed
GetTopWindow
GetSystemMetrics
GetSystemMenu
GetSysColorBrush
GetSubMenu
GetScrollRange
GetScrollPos
GetScrollInfo
GetPropA
GetParent
GetMessageW
GetMessageTime
GetMessagePos
GetMessageA
GetMenuStringA
GetMenuState
GetMenuItemInfoA
GetMenuItemID
GetMenuItemCount
GetLastActivePopup
GetKeyState
GetKeyNameTextA
GetKeyboardType
GetKeyboardState
GetKeyboardLayoutNameA
GetKeyboardLayoutList
GetIconInfo
GetForegroundWindow
GetFocus
GetDesktopWindow
GetDCEx
GetCursorPos
GetClipboardData
GetClientRect
GetClassNameA
GetClassLongA
GetClassInfoA
GetCapture
GetActiveWindow
FindWindowW
FindWindowA
FillRect
EqualRect
EnumWindows
EnumThreadWindows
EnumChildWindows
EnableWindow
EnableScrollBar
EnableMenuItem
EmptyClipboard
DrawTextA
DrawMenuBar
DrawIconEx
DrawFrameControl
DrawFocusRect
DrawEdge
DispatchMessageW
DispatchMessageA
DestroyWindow
DestroyMenu
DestroyIcon
DestroyCursor
FrameRect
gdi32
GetTextExtentPointA
GetTextFaceA
GetTextMetricsA
GetWindowOrgEx
GetWinMetaFileBits
IntersectClipRect
LineTo
LPtoDP
MaskBlt
MoveToEx
PatBlt
PlayEnhMetaFile
RealizePalette
Rectangle
RectVisible
RestoreDC
SaveDC
SelectClipRgn
GetTextExtentPoint32A
SelectPalette
SetBkColor
SetBkMode
SetBrushOrgEx
SetMapMode
SetPixel
SetROP2
SetStretchBltMode
SetTextColor
SetViewportOrgEx
SetWindowOrgEx
SetWinMetaFileBits
StretchBlt
GetEnhMetaFilePaletteEntries
TextOutA
UnrealizeObject
GetEnhMetaFileHeader
GetEnhMetaFileDescriptionA
GetSystemPaletteEntries
GetStockObject
GetRgnBox
GetPixel
GetPaletteEntries
SelectObject
GetDeviceCaps
GetEnhMetaFileBits
GetDIBits
GetDIBColorTable
GetObjectA
winspool.drv
SetPrinterW
SetPrinterDataW
SetPrinterDataExW
StartDocPrinterW
StartPagePrinter
WritePrinter
WaitForPrinterChange
XcvDataW
StartDocPrinterA
advapi32
RegSetValueExA
RegQueryValueExW
RegQueryValueExA
InitializeSecurityDescriptor
RegFlushKey
SetSecurityDescriptorDacl
ole32
OleSetMenuDescriptor
ProgIDFromCLSID
StringFromCLSID
OleDraw
oleaut32
VariantInit
VariantCopy
VariantClear
VariantChangeType
SysReAllocStringLen
Sections
.text Size: 428KB - Virtual size: 424KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 12.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data1 Size: 4KB - Virtual size: 537B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.9MB - Virtual size: 1.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.loq529 Size: 2.0MB - Virtual size: 2.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE