Static task
static1
Behavioral task
behavioral1
Sample
Adjprog.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
Adjprog.exe
Resource
win10v2004-20230915-en
General
-
Target
Adjprog.exe
-
Size
8.0MB
-
MD5
58c481d034be36b04781d16a31843a6f
-
SHA1
03557e6fee01aa3f8d142503840e799baa7d20e5
-
SHA256
4afd10e77d2c58795451e783f7f9986cf33d00f7365be21a1e3395c21a16d0cd
-
SHA512
7fe878c12d4d35cfd2270ae5588bdb2f76f790ce4ab1d3009e4a43b3274229e51bc8030b9c1c99589ebc3a0fccb2db7084c18aed62a449b4eb1fec579e1e6a8b
-
SSDEEP
196608:1y7Q3a4QFgahmM9SxF7sKSc7iiS0YSEMSV:JQFpn9SMWvOMS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Adjprog.exe
Files
-
Adjprog.exe.exe windows:4 windows x86
b464777e6287b99767d221e962444ea3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegQueryValueA
RegOpenKeyA
RegEnumKeyA
RegDeleteKeyA
RegSetValueExA
RegCreateKeyExA
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
gdi32
SetTextColor
RectVisible
TextOutA
ExtTextOutA
Escape
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
DeleteDC
GetStockObject
GetDeviceCaps
EnumFontFamiliesExA
GetObjectA
SetBkMode
SetBkColor
RestoreDC
SaveDC
CreateBitmap
CreateCompatibleDC
CreateDIBitmap
SelectObject
SetStretchBltMode
StretchBlt
DeleteObject
CreateFontA
CreateSolidBrush
GetClipBox
SetMapMode
PtVisible
kernel32
FormatMessageA
GetModuleFileNameW
VirtualProtect
GetCurrentDirectoryA
GlobalFlags
LocalAlloc
LeaveCriticalSection
TlsGetValue
EnterCriticalSection
GlobalReAlloc
GlobalHandle
InitializeCriticalSection
TlsAlloc
TlsSetValue
LocalReAlloc
DeleteCriticalSection
TlsFree
InterlockedIncrement
GetCPInfo
GetOEMCP
SetErrorMode
FileTimeToSystemTime
FileTimeToLocalFileTime
GetFileTime
FindResourceExA
RtlUnwind
GetSystemTimeAsFileTime
GetDriveTypeA
LocalFree
GetDateFormatA
GetFileInformationByHandle
PeekNamedPipe
GetFileType
RaiseException
ExitProcess
VirtualAlloc
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
GetStartupInfoA
ExitThread
CreateThread
HeapSize
GetTimeZoneInformation
HeapDestroy
HeapCreate
VirtualFree
GetStdHandle
GetACP
IsValidCodePage
GetConsoleCP
GetConsoleMode
SetStdHandle
LockResource
GetStringTypeA
GetStringTypeW
LCMapStringA
LCMapStringW
FreeEnvironmentStringsA
GetEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
GetFullPathNameA
GetVolumeInformationA
GetCurrentProcess
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetThreadLocale
GlobalGetAtomNameA
GlobalFindAtomA
lstrcmpW
MulDiv
FreeResource
GetCurrentProcessId
SetLastError
GlobalAddAtomA
SuspendThread
SetEvent
SetThreadPriority
GlobalDeleteAtom
GetCurrentThread
GetCurrentThreadId
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
lstrcmpA
FreeLibrary
GetModuleHandleA
GetProcAddress
CompareStringA
CompareStringW
InterlockedExchange
GetVersion
CreateEventA
WaitForSingleObject
WritePrivateProfileStringA
GlobalFree
SetCurrentDirectoryA
WinExec
SetFileAttributesA
FindFirstFileA
MoveFileA
FindNextFileA
FindClose
RemoveDirectoryA
CreateDirectoryA
GetFileAttributesA
DeleteFileA
CreateMutexW
GetVersionExA
CreateFileA
DeviceIoControl
GetLastError
CloseHandle
MultiByteToWideChar
InterlockedDecrement
HeapReAlloc
HeapFree
GetProcessHeap
HeapAlloc
lstrlenA
ResumeThread
GlobalAlloc
GlobalLock
GlobalUnlock
GetExitCodeThread
Sleep
WideCharToMultiByte
LoadResource
LockResource
SizeofResource
FindResourceA
GetWindowsDirectoryA
GetModuleFileNameA
GetPrivateProfileIntA
GetPrivateProfileStringA
GetTimeFormatA
oleaut32
SysAllocString
VariantInit
VariantChangeType
SafeArrayGetDim
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayAccessData
SafeArrayUnaccessData
SysStringLen
SysAllocStringLen
VariantClear
SysFreeString
shell32
ShellExecuteA
shlwapi
PathFindFileNameA
PathStripToRootA
PathIsUNCA
PathFindExtensionA
strgene
?GetStrImage@@YAXPAEHPAY1BFBI@DA@E@Z
user32
DestroyMenu
GetAsyncKeyState
MapDialogRect
GetSysColorBrush
UnregisterClassA
SendDlgItemMessageA
GetCapture
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SetFocus
GetWindowTextLengthA
GetWindowTextA
GetForegroundWindow
GetTopWindow
UnhookWindowsHookEx
GetMessageTime
GetMessagePos
MapWindowPoints
ScrollWindow
GetScrollRange
GetScrollPos
SetForegroundWindow
GetMenu
GetSubMenu
GetMenuItemID
GetMenuItemCount
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
SetScrollInfo
PtInRect
SetWindowPlacement
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
GetWindowPlacement
GetWindow
GetSysColor
ClientToScreen
ScreenToClient
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
GetDesktopWindow
SetActiveWindow
DestroyWindow
IsWindow
GetDlgItem
GetNextDlgTabItem
EndDialog
GetWindowThreadProcessId
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
SetCursor
SetWindowsHookExA
CallNextHookEx
GetMessageA
GetActiveWindow
GetKeyState
GetCursorPos
ValidateRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
ModifyMenuA
GetMenuState
EnableMenuItem
CheckMenuItem
PostQuitMessage
CharUpperA
KillTimer
SetTimer
PeekMessageA
TranslateMessage
DispatchMessageA
wsprintfA
IsWindowVisible
UpdateWindow
LoadCursorA
CopyIcon
InvalidateRect
GetDC
GetDlgCtrlID
BeginPaint
EndPaint
ReleaseDC
PostMessageA
LoadIconA
GetClientRect
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
GetDlgItemTextA
IsIconic
GetSystemMenu
AppendMenuA
DrawIcon
EnableWindow
RedrawWindow
GetWindowRect
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
GetSystemMetrics
SetDlgItemTextA
GetParent
SendMessageA
WinHelpA
MessageBoxA
SetSystemCursor
RegisterClipboardFormatA
CreateDialogIndirectParamA
winspool.drv
DocumentPropertiesA
ClosePrinter
EnumPortsA
OpenPrinterA
apdadrv
?ADD4Termination@CApdadrv@@QAEKXZ
?ioctl@CApdadrv@@QAEPAXW4apdadrvIoctl_t@@PAX@Z
?ADGetDeviceID@CApdadrv@@QAEKPAEK@Z
?ADD4Negotiation@CApdadrv@@QAEKXZ
?ADD4ReceiveDataFromDataCh@CApdadrv@@QAEKPAEKAAK@Z
?ADD4SendAndReceiveCtrlCh@CApdadrv@@QAEKPAEK0KAAK@Z
?ADD4SetCommPacketSize@CApdadrv@@QAEXGGGG@Z
?ADPortClose@CApdadrv@@QAEHXZ
?ADPortOpen@CApdadrv@@QAEKPBD@Z
??0CApdadrv@@QAE@XZ
?ADD4SendDataToDataCh@CApdadrv@@QAEKPAEKAAK@Z
??1CApdadrv@@QAE@XZ
?ADSetRWTimeOut@CApdadrv@@QAEXU_COMMTIMEOUTS@@@Z
comdlg32
GetFileTitleA
ole32
CoCreateInstance
CoInitializeSecurity
CoSetProxyBlanket
CoInitializeEx
CoUninitialize
Sections
Size: 2.6MB - Virtual size: 2.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Size: 581KB - Virtual size: 592KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 426KB - Virtual size: 9.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 148KB - Virtual size: 148KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 16KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 3.3MB - Virtual size: 3.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 978KB - Virtual size: 980KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.SCY Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE