Static task
static1
Behavioral task
behavioral1
Sample
adb8b26144273a238806869781b4b43a.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
adb8b26144273a238806869781b4b43a.exe
Resource
win10v2004-20240226-en
General
-
Target
adb8b26144273a238806869781b4b43a
-
Size
47KB
-
MD5
adb8b26144273a238806869781b4b43a
-
SHA1
292bdd94aa8e7528e7d929c2a3776dddb1837379
-
SHA256
e6648e46fd6f4941206b6155bf7668ad25ced2078b7671b9664cfca2c772e461
-
SHA512
7470914ff4ca43f612e24bff6175e0b1dcb474c62110fb92a99db3b9ababaf85608e389a175cc28fd8dcff687d1dfbd6ebf6b033e0fa55e957d1bf714bc6c4ea
-
SSDEEP
768:hJN0nSNigU4n62CpInm4jSVGFT+TpJa27uDlq5I7:CXgUX4jfzxP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource adb8b26144273a238806869781b4b43a
Files
-
adb8b26144273a238806869781b4b43a.exe windows:4 windows x86 arch:x86
eba47e36aa87180892ba1744c92cd784
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcessHeap
SetLastError
SetInformationJobObject
lstrcmpiA
FindNextChangeNotification
QueueUserAPC
GetLargestConsoleWindowSize
lstrcpynW
FindNextVolumeA
EnumSystemLocalesA
GetFileType
FreeResource
ReadProcessMemory
GetProcessPriorityBoost
GetCurrentProcess
SetEndOfFile
CreateHardLinkA
FreeLibraryAndExitThread
BuildCommDCBAndTimeoutsW
CreateMutexA
GetDiskFreeSpaceExA
DefineDosDeviceA
HeapFree
GetSystemDefaultLCID
MulDiv
GetStartupInfoW
SetComputerNameW
SetLocalTime
SetConsoleCursorInfo
GetFileAttributesExW
GetFileAttributesW
FindResourceW
ExitThread
GetTimeZoneInformation
RequestWakeupLatency
GetCommConfig
FileTimeToLocalFileTime
GetLogicalDrives
GlobalAddAtomA
FindResourceExA
Sleep
GetPrivateProfileStringW
LocalSize
GetFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
GetModuleHandleA
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TerminateProcess
InterlockedCompareExchange
InterlockedExchange
Beep
HeapAlloc
GetSystemTimeAsFileTime
user32
VkKeyScanExA
GetDlgItemTextW
HideCaret
DragObject
OemToCharBuffA
ToAscii
GetCursorInfo
DlgDirSelectComboBoxExA
EmptyClipboard
GetClassInfoExW
LoadImageW
ChangeDisplaySettingsA
FindWindowA
SetCapture
GetSysColor
CountClipboardFormats
SetPropA
CheckMenuRadioItem
GetListBoxInfo
GetKeyNameTextW
SetCursorPos
BeginDeferWindowPos
ReleaseDC
UnhookWinEvent
CreateIconIndirect
IsClipboardFormatAvailable
DialogBoxIndirectParamW
OpenIcon
GetMenuItemRect
CallWindowProcA
InvalidateRgn
GetPropA
KillTimer
SetTimer
GetWindowThreadProcessId
CharLowerBuffA
SendMessageTimeoutW
advapi32
RegLoadKeyA
msvcrt
free
malloc
memset
__getmainargs
_cexit
_exit
_XcptFilter
exit
_initterm
_amsg_exit
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
?terminate@@YAXXZ
_controlfp
__set_app_type
ntdll
RtlUnwind
wininet
InternetCloseHandle
Sections
.text Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 17KB - Virtual size: 107KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 848B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ