Static task
static1
Behavioral task
behavioral1
Sample
ad2c763e60c8cdd3879e0f3738d613b02815737b513c431ad96eece301fb3adb.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
ad2c763e60c8cdd3879e0f3738d613b02815737b513c431ad96eece301fb3adb.exe
Resource
win10v2004-20231215-en
General
-
Target
ad2c763e60c8cdd3879e0f3738d613b02815737b513c431ad96eece301fb3adb
-
Size
7.9MB
-
MD5
5af0342976d2bbd19330fd12f61c0758
-
SHA1
bf824aa16816370872b6d2cb5d07a81952bdabb0
-
SHA256
ad2c763e60c8cdd3879e0f3738d613b02815737b513c431ad96eece301fb3adb
-
SHA512
fa7a562b901976b7033af884e326264694112208bd75ce835a26005463c87c1810bbafcd7e6357b86664d6d4a4adfe257a3cdeda2bc9d208db9ba026e0561794
-
SSDEEP
196608:UlkgcuYU17u60LKyrIPZtlMwJjtxTE3t3G1tSPhYAU43vCra:JRurZ6+ZtuwJj7w3G1Q5YAJvC2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ad2c763e60c8cdd3879e0f3738d613b02815737b513c431ad96eece301fb3adb
Files
-
ad2c763e60c8cdd3879e0f3738d613b02815737b513c431ad96eece301fb3adb.exe windows:6 windows x64 arch:x64
f2eb3a39f7f4a79c48b83baff93fbd20
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
LockResource
CloseHandle
LoadResource
FindResourceW
CreateProcessW
WriteConsoleW
SetFilePointerEx
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
Sleep
HeapSize
GetProcessHeap
GetStringTypeW
GetFileType
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
WideCharToMultiByte
MultiByteToWideChar
GetCommandLineW
GetCommandLineA
FreeResource
CreateFileW
GetModuleFileNameW
WriteFile
SizeofResource
HeapReAlloc
CreateDirectoryW
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
RtlUnwindEx
RtlPcToFileHeader
RaiseException
GetLastError
SetLastError
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
EncodePointer
GetStdHandle
ExitProcess
GetModuleHandleExW
FlsAlloc
FlsGetValue
FlsSetValue
FlsFree
LCMapStringW
HeapAlloc
HeapFree
FindClose
FindFirstFileExW
FindNextFileW
user32
MessageBoxW
advapi32
RegCloseKey
RegFlushKey
RegCreateKeyExW
RegSetValueExW
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
shell32
SHGetSpecialFolderPathW
shlwapi
PathIsDirectoryW
Sections
.text Size: 53KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 252B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 7.7MB - Virtual size: 7.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ