Static task
static1
Behavioral task
behavioral1
Sample
ad1fdcbcbe5b7a67e826a52b6e04dcc8.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ad1fdcbcbe5b7a67e826a52b6e04dcc8.exe
Resource
win10v2004-20240226-en
General
-
Target
ad1fdcbcbe5b7a67e826a52b6e04dcc8
-
Size
422KB
-
MD5
ad1fdcbcbe5b7a67e826a52b6e04dcc8
-
SHA1
84935a3b0b01f9e868a044f0be1966c230a3c1e7
-
SHA256
ac585c0d6a07ac3eb6d2e3a1b5c58c876beb51c5135b76d41acec19f5ac21d78
-
SHA512
e5e7152dc7f0a318cdd45f39e24e727c127ab8f281b2ee4fd3769d51ed36f88f8a153c43c738c9c9a674b0708bbab8621adb548bc85a96aea151edad4a96265b
-
SSDEEP
6144:qt5SDyGH0sexgT2zDY1jbbheoWr0uVPcTUIRxO6VyeGNmnTLBBwazrfC+3IS7suQ:YLGO42XCkVEAIR5GYTfC+3R7suOXuO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ad1fdcbcbe5b7a67e826a52b6e04dcc8
Files
-
ad1fdcbcbe5b7a67e826a52b6e04dcc8.exe windows:4 windows x86 arch:x86
ee02700a8baee0428d4071e5c71e5a14
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
EndDoc
OffsetWindowOrgEx
CreateDIBPatternBrushPt
GetRegionData
ResizePalette
GetBkMode
CreatePen
CreateICW
SetViewportOrgEx
CreateMetaFileA
GetAspectRatioFilterEx
CopyMetaFileW
PlayEnhMetaFile
GetCharacterPlacementA
BeginPath
SetBkMode
SetLayout
CreatePatternBrush
ResetDCA
GetCharWidth32W
FlattenPath
RealizePalette
advapi32
RegReplaceKeyA
LookupAccountNameA
CryptCreateHash
CryptSignHashW
CryptSetProviderA
RegSaveKeyW
RegSetValueExA
LookupPrivilegeValueA
RegSetKeySecurity
LogonUserA
StartServiceW
RegReplaceKeyW
InitiateSystemShutdownW
RegQueryInfoKeyW
LookupPrivilegeNameW
CryptDuplicateHash
LogonUserW
RegEnumValueW
CryptGetDefaultProviderW
LookupPrivilegeDisplayNameW
comdlg32
PrintDlgA
kernel32
ExitProcess
GetTickCount
WideCharToMultiByte
GetEnvironmentStrings
GetCurrentThread
GetFileAttributesA
GetFileType
GetStdHandle
LockFile
CreateProcessW
TlsAlloc
GetSystemTimeAsFileTime
GetSystemInfo
EnumSystemLocalesA
GetCommandLineA
LoadLibraryA
GetCurrentProcessId
MultiByteToWideChar
GetTimeFormatA
TlsGetValue
VirtualAlloc
TlsSetValue
SetEvent
IsBadWritePtr
GetCPInfo
GetCalendarInfoW
HeapCreate
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetDateFormatW
SetConsoleTextAttribute
SetLastError
GetCurrentProcess
GetUserDefaultLCID
GetPrivateProfileStructW
GetCurrentThreadId
DeleteCriticalSection
LeaveCriticalSection
SetHandleCount
WaitCommEvent
VirtualQuery
IsValidLocale
HeapAlloc
InterlockedExchange
GetLocaleInfoW
CompareStringW
VirtualProtect
GetConsoleCursorInfo
LCMapStringW
GetSystemTimeAdjustment
EnumCalendarInfoW
TlsFree
GetStartupInfoA
GetOEMCP
WriteFile
IsValidCodePage
GetProcAddress
GetModuleFileNameA
TerminateProcess
InitializeCriticalSection
HeapFree
GetLocaleInfoA
GetTimeZoneInformation
GetLastError
RtlUnwind
LCMapStringA
UnhandledExceptionFilter
GetTempPathA
GetStringTypeW
HeapReAlloc
CompareStringA
GetConsoleScreenBufferInfo
GetSystemDefaultLangID
GetProcessAffinityMask
FreeEnvironmentStringsA
GetVersionExA
QueryPerformanceCounter
EnterCriticalSection
GetACP
GetStringTypeA
VirtualFree
SetEnvironmentVariableA
HeapDestroy
HeapSize
GetDateFormatA
FillConsoleOutputAttribute
GetModuleHandleA
wininet
GopherGetAttributeA
FreeUrlCacheSpaceA
InternetShowSecurityInfoByURLW
InternetGetConnectedStateExW
InternetGoOnlineW
InternetHangUp
InternetSetOptionExW
FindFirstUrlCacheContainerA
InternetAlgIdToStringA
Sections
.text Size: 122KB - Virtual size: 121KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 278KB - Virtual size: 277KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ