Static task
static1
Behavioral task
behavioral1
Sample
ada191e87fec7b780f13430504392ff2.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ada191e87fec7b780f13430504392ff2.exe
Resource
win10v2004-20240226-en
General
-
Target
ada191e87fec7b780f13430504392ff2
-
Size
137KB
-
MD5
ada191e87fec7b780f13430504392ff2
-
SHA1
5237edf8f6edb06ac26c3dd4eceb46ca2f2e5990
-
SHA256
a8d339579d8b7a9a622f62bb03949691d7deb0455886111c696e5b5d57e3524f
-
SHA512
b91fafeb14f7185e89c940ea32a93d0266ec2aa9d3f6387d9fa4ea4f775c3134a1d888481404ff7f0b5ca4c8f9ed1d263d6b96d7ed9e59a7d6cb240aa72b2028
-
SSDEEP
3072:KbPN+VmO91ASZ4L016HxawPQrwmy5MmtiJCMAiTBtPiSfL/U:KWJZJ1Gx9uwmy7g0biTj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ada191e87fec7b780f13430504392ff2
Files
-
ada191e87fec7b780f13430504392ff2.exe windows:4 windows x86 arch:x86
6ad5fded777f153d7895df72c960367e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateThread
ExitProcess
ExitThread
FreeLibrary
GetACP
GetCommandLineA
GetCurrentProcessId
GetCurrentThreadId
GetExitCodeThread
GetFileTime
GetModuleHandleA
GetStartupInfoA
GetSystemTimeAsFileTime
GetTickCount
LoadLibraryA
QueryPerformanceCounter
SetEnvironmentVariableA
SetUnhandledExceptionFilter
TerminateThread
VirtualAlloc
VirtualProtect
lstrcmpA
msvcrt
strstr
strcat
fwrite
atoi
atol
wcscmp
user32
PostQuitMessage
MsgWaitForMultipleObjects
FillRect
EnableWindow
CreatePopupMenu
GetClassLongA
comctl32
CreateStatusWindowA
GetEffectiveClientRect
InitCommonControls
ShowHideMenuCtl
CreatePropertySheetPageA
Sections
.text Size: 79KB - Virtual size: 80KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 25KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 21KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ