Static task
static1
Behavioral task
behavioral1
Sample
adb4679f917ac1cec238395bfd71071b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
adb4679f917ac1cec238395bfd71071b.exe
Resource
win10v2004-20240226-en
General
-
Target
adb4679f917ac1cec238395bfd71071b
-
Size
102KB
-
MD5
adb4679f917ac1cec238395bfd71071b
-
SHA1
0e0bdd6f3d5817f4bb35a831d13922401774bc1a
-
SHA256
cffda562cf9b9c0e25691a9b8766ec4d75f3434cda1c4a2052ae70e6150637e9
-
SHA512
3bbef147aafb3f11bd11a2b4005257135986750c6b1d23cf76fa013da66e5d0d1db4f4fcf194217b156eb604e820230ca7ab9ec6964c1abfbe8efb936ba12e72
-
SSDEEP
1536:Srq7pdE+PUF4+3FTIOsRjvyXZIIWaTwhsuVjL/8cQBBnIeKaPsR4eiz:AqndMCGFTIPRjvyDWyhuVn/84aGJi
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource adb4679f917ac1cec238395bfd71071b
Files
-
adb4679f917ac1cec238395bfd71071b.exe windows:4 windows x86 arch:x86
043b0c1746e8a8e0613e94d674631402
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
oleaut32
SafeArrayGetUBound
SafeArrayUnaccessData
RegisterTypeLib
msvcrt
memmove
strncmp
memcpy
calloc
malloc
tan
user32
EndPaint
GetMessagePos
EnableMenuItem
CreateWindowExA
GetScrollInfo
CallWindowProcA
SystemParametersInfoA
EnumChildWindows
GetSysColorBrush
DefWindowProcA
GetForegroundWindow
CharToOemA
EnableScrollBar
CallNextHookEx
GetScrollPos
BeginPaint
CreateIcon
GetActiveWindow
CreateMenu
DrawTextA
EnableWindow
MessageBoxA
GetClassInfoA
GetFocus
GetPropA
GetScrollRange
IsWindowVisible
GetKeyState
GetDC
FillRect
GetCursor
GetKeyNameTextA
shell32
SHGetSpecialFolderLocation
SHGetDiskFreeSpaceA
Shell_NotifyIconA
SHGetDesktopFolder
SHFileOperationA
shlwapi
SHDeleteValueA
PathGetCharTypeA
SHQueryInfoKeyA
PathIsDirectoryA
advapi32
GetLengthSid
RegEnumKeyA
RegOpenKeyExA
RegQueryInfoKeyA
kernel32
MulDiv
lstrcpyA
GetCPInfo
SetHandleCount
DeleteFileA
CompareStringA
HeapAlloc
HeapDestroy
FreeLibrary
FindResourceA
EnumCalendarInfoA
ReadFile
GetStringTypeW
GetModuleHandleA
SetLastError
GetStringTypeA
SetFilePointer
CreateThread
GetCommandLineA
ResetEvent
GetDiskFreeSpaceA
FindFirstFileA
LoadLibraryExA
VirtualAlloc
GetFileSize
GlobalFindAtomA
InitializeCriticalSection
CloseHandle
RaiseException
GetACP
EnterCriticalSection
LoadLibraryA
GetLocalTime
GetVersion
FreeResource
GlobalAddAtomA
GetTickCount
GetOEMCP
lstrlenA
WideCharToMultiByte
GetEnvironmentStrings
FindClose
SetEndOfFile
GetVersionExA
Sleep
GetCurrentProcessId
lstrcpynA
MoveFileA
SetErrorMode
GetLastError
GetDateFormatA
GetModuleFileNameA
VirtualAllocEx
GetLocaleInfoA
GetCurrentProcess
GetFileAttributesA
GetCurrentThreadId
GlobalAlloc
ExitProcess
GetThreadLocale
lstrcmpA
SetEvent
LoadResource
DeleteCriticalSection
GetCurrentThread
Sections
CODE Size: 51KB - Virtual size: 50KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 359B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 47KB - Virtual size: 46KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
BSS Size: 1024B - Virtual size: 783B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE