Static task
static1
Behavioral task
behavioral1
Sample
ad7cd727266485bc53bf0235ac06e180.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ad7cd727266485bc53bf0235ac06e180.exe
Resource
win10v2004-20240226-en
General
-
Target
ad7cd727266485bc53bf0235ac06e180
-
Size
62KB
-
MD5
ad7cd727266485bc53bf0235ac06e180
-
SHA1
8b8c08fb3f2d7139c08c6a55831861a3411b94bc
-
SHA256
98c497b15dacdec68ea527f938a2f014b81f1512acff3b11830e3b94db37a1b1
-
SHA512
68f6230b3a2eb4cd445d80e86a4c998e3b360b9c1d07ea08b32e7b3fb7bf46838e2758539b60e121ebf8af9d8d8daff0bf5e7e5fe5b859398ab6f032ada07c1f
-
SSDEEP
1536:GvJtOGfjdzRyltUNUTmKmkc0H6C2oXyfd0vgoS:+zHF4t0LWbF2LV0vgoS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ad7cd727266485bc53bf0235ac06e180
Files
-
ad7cd727266485bc53bf0235ac06e180.exe windows:4 windows x86 arch:x86
9fba3ff751ccdba54293c9b18016bb0f
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
VirtualFree
VirtualAlloc
LocalFree
LocalAlloc
GetVersion
GetCurrentThreadId
GetThreadLocale
GetStartupInfoA
GetModuleFileNameA
GetLocaleInfoA
GetCommandLineA
FreeLibrary
ExitProcess
WriteFile
UnhandledExceptionFilter
RtlUnwind
RaiseException
GetStdHandle
TlsSetValue
TlsGetValue
LocalAlloc
GetModuleHandleA
WriteProcessMemory
TerminateProcess
SizeofResource
SetThreadContext
ResumeThread
ReadProcessMemory
LockResource
LoadResource
GetThreadContext
FreeResource
FindResourceA
ExitProcess
CreateProcessA
VirtualProtectEx
VirtualAllocEx
user32
GetKeyboardType
MessageBoxA
CharNextA
advapi32
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
ntdll
ZwUnmapViewOfSection
Sections
CODE Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 512B - Virtual size: 192B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 1KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 8B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 880B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
FYPMJW8F Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
upx Size: 82B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
fsg Size: 102B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ