Static task
static1
Behavioral task
behavioral1
Sample
ad9fd347848f41ebfd9edd5a7792e5d0.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ad9fd347848f41ebfd9edd5a7792e5d0.exe
Resource
win10v2004-20240226-en
General
-
Target
ad9fd347848f41ebfd9edd5a7792e5d0
-
Size
696KB
-
MD5
ad9fd347848f41ebfd9edd5a7792e5d0
-
SHA1
4862d879220bc54029be6504c5d8266c85702781
-
SHA256
39d6da70278768351766e684fa3edd4cc1da7576dcaa0fdae507dec4073d2d11
-
SHA512
d3ce35a720ffada30da5f31490d7926cc12b4a988021f0ca47327ad1904afa8ae8b03f154c4218830cd1331a0fd01bcd312339ea69af8f37a883221293a22098
-
SSDEEP
12288:W+nF9LhabPixLThYTzk4AwMJvF+0hbolbPV9ZjOFS5cUoF7A2DxXRTQeB0:P3ho6hYTzVhMBF+0hs90zlBkea
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ad9fd347848f41ebfd9edd5a7792e5d0
Files
-
ad9fd347848f41ebfd9edd5a7792e5d0.exe windows:4 windows x86 arch:x86
a31f677b59a02d65146ef08af5648586
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetLastError
SetEnvironmentVariableA
WideCharToMultiByte
MultiByteToWideChar
GetACP
GetOEMCP
FreeLibrary
GetProcAddress
LoadLibraryExA
LoadLibraryA
GetTempFileNameA
GetTempPathA
lstrcmpiA
GetLastError
GetUserDefaultLCID
GetModuleFileNameA
GlobalLock
GlobalAlloc
GlobalUnlock
GlobalFree
GetCurrentProcessId
FileTimeToDosDateTime
FileTimeToLocalFileTime
GetFileTime
FindClose
CloseHandle
ReadFile
WriteFile
SetFilePointer
LockFile
UnlockFile
GetLocalTime
IsDBCSLeadByte
GetVersionExA
FindNextFileA
FindNextFileW
GetLocaleInfoA
CreateFileA
CreateFileW
DeleteFileA
DeleteFileW
MoveFileA
MoveFileW
GetTempPathW
GetFullPathNameA
GetFullPathNameW
GetFileAttributesA
GetFileAttributesW
FindFirstFileA
FindFirstFileW
GetModuleHandleA
GetModuleHandleW
GetDriveTypeA
CreateDirectoryA
CompareStringW
CreateDirectoryW
GetCurrentDirectoryA
GetCurrentDirectoryW
RemoveDirectoryA
RemoveDirectoryW
SetCurrentDirectoryA
SetCurrentDirectoryW
LoadLibraryExW
CompareStringA
_llseek
_lwrite
_lread
FlushFileBuffers
_lclose
HeapFree
HeapAlloc
GetCommandLineA
GetTimeZoneInformation
GetSystemTimeAsFileTime
GetCPInfo
InterlockedDecrement
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
GetStringTypeA
GetStringTypeW
GetCurrentProcess
LCMapStringA
LCMapStringW
OutputDebugStringA
HeapDestroy
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
HeapReAlloc
ExitProcess
GetStdHandle
SetHandleCount
GetFileType
GetStartupInfoA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
Sleep
RaiseException
InitializeCriticalSection
RtlUnwind
VirtualProtect
GetSystemInfo
VirtualQuery
VirtualAllocEx
GetVersion
FileTimeToSystemTime
LocalAlloc
LocalSize
LocalFree
user32
LoadImageW
DialogBoxParamW
DestroyIcon
LoadCursorW
SetCursor
IsWindow
SendMessageW
SetDlgItemTextW
InvalidateRect
GetDlgItemTextW
GetSysColor
DrawFocusRect
GetSystemMetrics
CharPrevW
CharNextW
IsWindowVisible
MessageBoxW
DrawIcon
SetWindowTextW
SendDlgItemMessageW
EnableWindow
LoadIconW
DialogBoxIndirectParamW
SetWindowLongW
EnumChildWindows
EndDialog
GetWindow
GetWindowRect
GetWindowLongW
SystemParametersInfoW
SetWindowPos
pid
DllCanUnloadNow
DllGetClassObject
Sections
.text Size: 185KB - Virtual size: 184KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
����� Size: 494KB - Virtual size: 701KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 226KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ