Static task
static1
Behavioral task
behavioral1
Sample
ade26f0e1146b72152b09f4c5acea058.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ade26f0e1146b72152b09f4c5acea058.exe
Resource
win10v2004-20240226-en
General
-
Target
ade26f0e1146b72152b09f4c5acea058
-
Size
3.1MB
-
MD5
ade26f0e1146b72152b09f4c5acea058
-
SHA1
99f469d13af7935122a69d976598a1ba0ec38814
-
SHA256
e334ff7c1053c3d608c4d6faf01bbfb86470a57d9db50aadae061280c1a2384a
-
SHA512
5261066896ee2e1b7b125d9158ba35227dfc182695161e41843716ec9f3abfa4c366d65fe536d7edac03068372f25784a20c7f1acea1345969b59ff3dec232e2
-
SSDEEP
49152:gvsXIXtFhTHjOecqMKQJxiQjmw7gwrhlqJ:gvsY9FpHjFcq+JLmw77rv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ade26f0e1146b72152b09f4c5acea058
Files
-
ade26f0e1146b72152b09f4c5acea058.exe windows:3 windows x86 arch:x86
e9d6bb7e4c87cf78d81475c0a62985f0
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateFileA
EnterCriticalSection
GetCommandLineA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetModuleHandleA
GetVersionExA
HeapDestroy
InterlockedExchange
LocalAlloc
LocalFree
QueryPerformanceCounter
user32
EndDialog
GetKeyboardType
GetPropA
GetWindowRect
IsChild
IsDlgButtonChecked
KillTimer
LoadIconA
PeekMessageA
PostMessageA
SetDlgItemTextA
SetTimer
Sections
.CODE Size: 26KB - Virtual size: 25KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.BSS Size: - Virtual size: 21.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.DATA Size: 3.0MB - Virtual size: 3.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1024B - Virtual size: 722B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 63KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ