Static task
static1
Behavioral task
behavioral1
Sample
adf8db5cfefa8f376077516528e79b8740bd7f9e1c64e24305b88d020e535d7b.exe
Resource
win10-20231020-en
General
-
Target
adf8db5cfefa8f376077516528e79b8740bd7f9e1c64e24305b88d020e535d7b
-
Size
768KB
-
MD5
6a78b5c1072379abdce0c3e549433663
-
SHA1
af9355d15a6fc6c73a99984b76b21f08dcdc8d09
-
SHA256
adf8db5cfefa8f376077516528e79b8740bd7f9e1c64e24305b88d020e535d7b
-
SHA512
030902f73518a4a4484273cb683acc3bd14a4f550e7de43e14d6d8c3acb7466a174db2ddf0335cfc2a731259777b5558c6ad5f8a6cd114fafd68c8475351277b
-
SSDEEP
12288:2cnwQE0HgOdzvLmTGz7rgkTXVHfHxXJkXQsSik/MINM5VvNZh3yjmVhvRjJTSS:PdE0HgyPyGz7r9rdprNM5X3KqJTSS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource adf8db5cfefa8f376077516528e79b8740bd7f9e1c64e24305b88d020e535d7b
Files
-
adf8db5cfefa8f376077516528e79b8740bd7f9e1c64e24305b88d020e535d7b.exe windows:5 windows x86
0cce327fa0253e8d26487249a6cbdfb6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetDefaultCommConfigA
WriteConsoleInputW
GetLocaleInfoA
GetConsoleAliasExesA
GetDriveTypeW
CommConfigDialogA
GetCPInfo
lstrcpynA
FindResourceExW
FindResourceW
WaitNamedPipeA
QueryPerformanceCounter
GetEnvironmentStringsW
GetModuleHandleExW
GetModuleHandleW
GenerateConsoleCtrlEvent
ConvertFiberToThread
GetWindowsDirectoryA
GetCompressedFileSizeW
EnumTimeFormatsA
EnumTimeFormatsW
GetCommandLineA
GetEnvironmentStrings
GlobalAlloc
LoadLibraryW
ReadConsoleInputA
SetConsoleCP
EnumSystemCodePagesA
GetConsoleAliasW
GetFileAttributesW
SetSystemPowerState
ReplaceFileW
ReadFile
lstrcatA
FindNextVolumeMountPointW
GetComputerNameA
GetConsoleAliasesW
GetStartupInfoA
FindFirstFileA
GetLastError
SetLastError
PeekConsoleInputW
SetVolumeLabelW
MoveFileW
CopyFileA
FreeUserPhysicalPages
SetComputerNameA
VerLanguageNameW
GetTempFileNameA
FindClose
CreateEventW
RemoveDirectoryW
HeapLock
GetCommMask
AddAtomA
FoldStringW
FoldStringA
FindNextFileA
SetConsoleTitleW
FindNextFileW
VirtualProtect
QueryPerformanceFrequency
GetShortPathNameW
OpenSemaphoreW
GetVolumeNameForVolumeMountPointW
ReadConsoleOutputCharacterW
EnumSystemLocalesW
DeleteFileA
lstrcpyA
WriteConsoleW
FlushFileBuffers
GetStartupInfoW
GetSystemDefaultLangID
HeapFree
WideCharToMultiByte
HeapAlloc
GetProcAddress
ExitProcess
DecodePointer
HeapReAlloc
GetCommandLineW
HeapSetInformation
IsProcessorFeaturePresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
TerminateProcess
GetCurrentProcess
HeapCreate
EnterCriticalSection
LeaveCriticalSection
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
DeleteCriticalSection
InterlockedIncrement
InterlockedDecrement
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
WriteFile
GetModuleFileNameW
CloseHandle
FreeEnvironmentStringsW
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
SetFilePointer
GetConsoleCP
GetConsoleMode
Sleep
RaiseException
RtlUnwind
LCMapStringW
MultiByteToWideChar
GetStringTypeW
HeapSize
SetStdHandle
CreateFileW
user32
CharUpperW
advapi32
AbortSystemShutdownW
Sections
.text Size: 733KB - Virtual size: 732KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 3.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ