Static task
static1
Behavioral task
behavioral1
Sample
ad8f26aa7f52478c2ac80625ede4a60e.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
ad8f26aa7f52478c2ac80625ede4a60e.exe
Resource
win10v2004-20240226-en
General
-
Target
ad8f26aa7f52478c2ac80625ede4a60e
-
Size
86KB
-
MD5
ad8f26aa7f52478c2ac80625ede4a60e
-
SHA1
a33f031381ad53b81ef04282239919fc0f4ba34a
-
SHA256
c928679ca1ec55580abe14b59fa547726fba691f23222f9f8eccd97e71b81683
-
SHA512
a13e44cbd1a22003201522b262d229aa91b7f45966afd96781c7fabb67d58daf7dab96bc0bd2159642ed74081a1458ae8769a55795e9a6fd23f7b66628ddb10b
-
SSDEEP
1536:7LII66PCBj6WZqy8zvS3PHE6hvVOl3UCK6yn4rp1jH7h3+I:fINiXWZqy8zK/HEQklxK6q4rp1z7h
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ad8f26aa7f52478c2ac80625ede4a60e
Files
-
ad8f26aa7f52478c2ac80625ede4a60e.exe windows:4 windows x86 arch:x86
08b31acb1e91587b9cdedb19c0fa949f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentProcessId
CloseHandle
CreateFileA
GetModuleFileNameA
Sleep
CreateThread
SetLastError
GetLastError
TerminateProcess
OpenProcess
ReadFile
GetFileSize
WriteFile
SetFilePointer
SetFileAttributesA
GetLocalTime
ResumeThread
SetThreadContext
VirtualProtectEx
WriteProcessMemory
VirtualAllocEx
IsBadReadPtr
FreeLibrary
GetProcAddress
LoadLibraryA
ReadProcessMemory
GetThreadContext
CreateProcessA
GetCurrentDirectoryA
GetWindowsDirectoryA
MapViewOfFile
OpenFileMappingA
GetCommandLineA
GetModuleHandleA
GetTempFileNameA
GetTempPathA
DeleteFileA
CopyFileA
EndUpdateResourceA
UpdateResourceA
BeginUpdateResourceA
GetProcessVersion
lstrcmpiA
WideCharToMultiByte
MultiByteToWideChar
user32
MessageBoxA
msvcrt
wcscpy
__dllonexit
??2@YAPAXI@Z
strlen
strcat
memset
strcpy
memcpy
??3@YAXPAX@Z
ftell
fclose
fread
fseek
fopen
__CxxFrameHandler
wcslen
_onexit
fwrite
time
_itoa
_wcsicmp
_strnicmp
_wcsnicmp
??0exception@@QAE@ABV0@@Z
_EH_prolog
_CxxThrowException
??1exception@@UAE@XZ
??0exception@@QAE@ABQBD@Z
memmove
??1type_info@@UAE@XZ
Sections
.text Size: 49KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 4B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ