Static task
static1
Behavioral task
behavioral1
Sample
ad418b22b8ed9635062d6bda73d04392.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ad418b22b8ed9635062d6bda73d04392.exe
Resource
win10v2004-20240226-en
General
-
Target
ad418b22b8ed9635062d6bda73d04392
-
Size
870KB
-
MD5
ad418b22b8ed9635062d6bda73d04392
-
SHA1
54f281ca0fe75430463f6172b5834d5daaafbd0c
-
SHA256
07d263ae22b9dd08eb92474a0e56c99fa0de7bc343549681f126d306c31665d9
-
SHA512
275ff35436c0fb187d3b5c4f076b556ab81bd0a2aba8c70ce44a21f33e48f6673fb5ae37a6e397db62cd66894851bbd8ae4654a8f6ffeca72f3e0a0506c8f79b
-
SSDEEP
12288:dT8zemfZCVjvfBZzR+fRJL6IMAL23FRBvLqR3PPWgepALmqY02Z9IQ8wRF9:R8Ci8VjfBZzg76IRL21TeR3HkAS0O3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ad418b22b8ed9635062d6bda73d04392
Files
-
ad418b22b8ed9635062d6bda73d04392.exe windows:4 windows x86 arch:x86
d84cc0c9cd168b1e5734a46968fa4ed2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
PulseEvent
HeapCreate
IsBadStringPtrW
IsDebuggerPresent
GetDriveTypeA
GetStartupInfoA
GetModuleHandleA
DeleteFileA
CreateFileMappingW
TlsAlloc
HeapDestroy
ReleaseMutex
lstrlenA
Sleep
TlsGetValue
CreateFileA
GetModuleFileNameW
DeviceIoControl
GetCommandLineA
TlsGetValue
user32
IsZoomed
LoadImageA
IsWindow
FindWindowW
DestroyWindow
DispatchMessageA
GetWindowLongA
PeekMessageA
DestroyMenu
DrawTextW
DispatchMessageA
CallWindowProcW
GetIconInfo
colbact
PartitionAccessCheck
PartitionAccessCheck
PartitionAccessCheck
PartitionAccessCheck
cryptui
CryptUIDlgCertMgr
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 863KB - Virtual size: 862KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ