Static task
static1
Behavioral task
behavioral1
Sample
ffadb7d3707426c5b9998e00b4bea27a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
ffadb7d3707426c5b9998e00b4bea27a.exe
Resource
win10v2004-20231215-en
General
-
Target
ffadb7d3707426c5b9998e00b4bea27a
-
Size
10.3MB
-
MD5
ffadb7d3707426c5b9998e00b4bea27a
-
SHA1
561627848b9e53958b25cca7012fbf42684cec57
-
SHA256
8ccd499069ecdfbdc6b48d295d5e258acf967a60edf962057a74983cd4978708
-
SHA512
aab949615741b62cc70392c5f133493c624de74f37797664585619d899144628d4ceebdd560b6884b523ab2701ae6703849d419a30c50d7c7e4996d3a8eee480
-
SSDEEP
49152:0c67fffffffffffffffffffffffffffffffffffffffffffffffffffffffffffX:0c6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ffadb7d3707426c5b9998e00b4bea27a
Files
-
ffadb7d3707426c5b9998e00b4bea27a.exe windows:5 windows x86 arch:x86
24d4aae6dda34371187af9a3d123ea16
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetVolumeLabelA
CreateFileA
GlobalDeleteAtom
FindFirstFileW
lstrlenA
TlsGetValue
GetStringTypeA
SetLocalTime
GetDriveTypeW
GetNumberOfConsoleInputEvents
MapUserPhysicalPages
CallNamedPipeA
InterlockedIncrement
InterlockedDecrement
ScrollConsoleScreenBufferW
WritePrivateProfileSectionA
CreateDirectoryW
WaitForSingleObject
WriteConsoleInputA
SignalObjectAndWait
SetVolumeMountPointW
OpenSemaphoreA
FreeEnvironmentStringsA
GetModuleHandleW
GetPrivateProfileStringW
GetConsoleTitleA
SetCommState
WriteFileGather
CreateDirectoryExW
FindResourceExA
AddRefActCtx
GetPrivateProfileStructW
GetSystemTimeAdjustment
GlobalFlags
GetComputerNameExA
Beep
SetMessageWaitingIndicator
VerifyVersionInfoA
GetBinaryTypeA
GetAtomNameW
ReadFile
CompareStringW
GetACP
LCMapStringA
HeapReAlloc
SetCurrentDirectoryA
IsDBCSLeadByteEx
GetProcAddress
SetStdHandle
SetComputerNameA
CreateMemoryResourceNotification
GetPrivateProfileStringA
SetFileApisToOEM
OpenWaitableTimerA
Process32FirstW
OpenMutexA
LocalAlloc
SetCalendarInfoW
GetFileType
SetConsoleOutputCP
QueryDosDeviceW
WriteProfileSectionW
GetCommMask
AddAtomA
SetCommMask
EnumResourceTypesW
SetConsoleCursorInfo
GetThreadPriority
SetConsoleTitleW
GetModuleHandleA
EnumResourceNamesA
FindNextFileW
RequestWakeupLatency
BuildCommDCBA
GetCurrentDirectoryA
GetVersionExA
GetWindowsDirectoryW
GetCurrentProcessId
FindActCtxSectionStringW
ReadConsoleOutputCharacterW
InterlockedPushEntrySList
GetProfileSectionW
GetVolumeInformationW
IsProcessorFeaturePresent
FlushFileBuffers
CloseHandle
CreateFileW
HeapFree
InterlockedExchange
FileTimeToDosDateTime
GetLastError
MoveFileA
MultiByteToWideChar
GetCommandLineW
HeapSetInformation
GetStartupInfoW
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSectionAndSpinCount
WriteFile
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
DecodePointer
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
EncodePointer
GetModuleFileNameW
GetOEMCP
GetCPInfo
IsValidCodePage
TlsAlloc
TlsSetValue
GetCurrentThreadId
TlsFree
SetLastError
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
ExitProcess
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
DeleteCriticalSection
HeapValidate
IsBadReadPtr
HeapCreate
WriteConsoleW
SetFilePointer
RtlUnwind
OutputDebugStringA
OutputDebugStringW
LoadLibraryW
GetStringTypeW
LCMapStringW
HeapAlloc
GetModuleFileNameA
HeapSize
HeapQueryInformation
RaiseException
user32
GetCursorInfo
GetMenuInfo
GetComboBoxInfo
GetMenuBarInfo
advapi32
InitiateSystemShutdownW
Sections
.text Size: 187KB - Virtual size: 186KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 46KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 7.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 10.0MB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ