Static task
static1
Behavioral task
behavioral1
Sample
ad0e8b4f179dc024a769aed300124b13.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
ad0e8b4f179dc024a769aed300124b13.exe
Resource
win10v2004-20240226-en
General
-
Target
ad0e8b4f179dc024a769aed300124b13
-
Size
85KB
-
MD5
ad0e8b4f179dc024a769aed300124b13
-
SHA1
186f337b4ff6fad2820626b1f7150f3431215e8e
-
SHA256
7910b3d24a9a6503950a95dad951a4adbf41c915def6abc60ac61f96dc8b33fc
-
SHA512
125ba1da50bdcc9c835316bfdce1f5976047aca20b564d9b1c678e578b039a6eee63b2815ef0d54dcd0317faf369aa1c6b56276f742734eac141e32777d17671
-
SSDEEP
1536:jAt/C9HQs4oZ0qGo+m4pWBoSc//o3LB0ix2qUe5dh:jXZO9UTow2ix5Ue5
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ad0e8b4f179dc024a769aed300124b13
Files
-
ad0e8b4f179dc024a769aed300124b13.exe windows:5 windows x86 arch:x86
6e3b514783a341d8f42e9cb8b453eebd
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
advapi32
RegCreateKeyExA
RegOpenKeyExA
RegCloseKey
RegQueryValueExA
RegEnumKeyA
RegSetValueExA
ws2_32
inet_addr
ntohs
sendto
recv
connect
select
WSAGetLastError
htons
socket
__WSAFDIsSet
closesocket
gethostbyname
send
WSAStartup
ioctlsocket
user32
CharLowerA
CharUpperA
CharUpperBuffA
wsprintfA
wvsprintfA
kernel32
HeapSize
RtlUnwind
HeapReAlloc
VirtualAlloc
InitializeCriticalSectionAndSpinCount
GetLocaleInfoA
EnterCriticalSection
LeaveCriticalSection
GetStringTypeW
lstrlenA
WaitForSingleObject
GetTickCount
WideCharToMultiByte
CreateProcessA
FileTimeToSystemTime
GetTimeZoneInformation
GetProcAddress
GetLocalTime
LoadLibraryA
GetModuleHandleA
CloseHandle
FileTimeToLocalFileTime
ExitProcess
CreateFileA
SystemTimeToFileTime
GetSystemTimeAsFileTime
WriteFile
Sleep
GetFileAttributesA
GetSystemDirectoryA
lstrcatA
ExitThread
GetLastError
CopyFileA
SetFileAttributesA
GetModuleFileNameA
CreateMutexA
GetTempPathA
DeleteFileA
CreateThread
lstrcpyA
lstrcmpA
lstrcpynA
HeapAlloc
InterlockedIncrement
InterlockedDecrement
HeapFree
GetProcessHeap
lstrcmpiA
GlobalFree
GetFileSize
GlobalAlloc
ReadFile
GetTempFileNameA
MapViewOfFile
UnmapViewOfFile
GetCurrentThread
GetWindowsDirectoryA
GetDriveTypeA
GetEnvironmentVariableA
SetThreadPriority
FindFirstFileA
FindClose
CreateFileMappingA
FindNextFileA
SetFilePointer
GetSystemTime
GetCommandLineA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
LCMapStringA
MultiByteToWideChar
LCMapStringW
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
GetStartupInfoA
DeleteCriticalSection
HeapCreate
VirtualFree
QueryPerformanceCounter
GetCurrentProcessId
GetStringTypeA
Sections
.text Size: 54KB - Virtual size: 53KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 22KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE