Static task
static1
Behavioral task
behavioral1
Sample
ada2dcc5d4f34bc5cd7e70b7886925f5.exe
Resource
win7-20240221-en
General
-
Target
ada2dcc5d4f34bc5cd7e70b7886925f5
-
Size
244KB
-
MD5
ada2dcc5d4f34bc5cd7e70b7886925f5
-
SHA1
318070725d9fc7461336766060b46ac23a190c60
-
SHA256
1152610bd90dda53d5694594130154c32918cd52750db5e630880cbd6898e2de
-
SHA512
046a6f4e95b49e8195d036286911c52fd8a876d2db6b5972a68c7ce8c03092a44bc79e28e1e445f45b4f66ebbc479c13e4a0e714832a421754f472dddce6aec9
-
SSDEEP
6144:ptY3sILhG+/8C/RPo2iPyhQj0tZFMpyMO:ptY8IR/H5PzCR4ZMpyMO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ada2dcc5d4f34bc5cd7e70b7886925f5
Files
-
ada2dcc5d4f34bc5cd7e70b7886925f5.exe windows:4 windows x86 arch:x86
fefbe34f1308b1b25241ac6ec9093ebf
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLastError
VirtualAlloc
OpenSemaphoreA
GetExitCodeThread
GetTempPathA
VirtualProtect
LoadLibraryA
PulseEvent
GetProcAddress
GetModuleHandleA
IsBadCodePtr
DeleteFileA
TlsAlloc
GetCommandLineA
ResetEvent
GetCurrentThread
VirtualFree
GetStringTypeW
GetStringTypeA
LCMapStringW
MultiByteToWideChar
LCMapStringA
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
HeapSize
VirtualQuery
InterlockedExchange
RtlUnwind
HeapReAlloc
HeapAlloc
GetCPInfo
GetLocaleInfoA
Sleep
GetOEMCP
GetACP
HeapFree
HeapCreate
HeapDestroy
GetSystemInfo
GetFileType
SetHandleCount
GetEnvironmentStringsW
WideCharToMultiByte
GetStartupInfoA
GetVersionExA
ExitProcess
TerminateProcess
GetCurrentProcess
WriteFile
GetStdHandle
GetModuleFileNameA
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
user32
DestroyWindow
OpenIcon
GetLastActivePopup
LoadStringA
ShowWindow
LoadCursorA
GetDesktopWindow
GetDC
GetCursorPos
SetTimer
ReleaseDC
CreateIcon
IsIconic
SetCursorPos
FindWindowA
GetWindowRect
SetCursor
SendMessageA
gdi32
PatBlt
shell32
DuplicateIcon
ord256
psapi
GetWsChanges
EnumProcesses
GetModuleInformation
ws2_32
WSAStartup
WSACleanup
Sections
.text Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 116KB - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 88KB - Virtual size: 85KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ