CanReload
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
TBStudioReg
Static task
static1
Behavioral task
behavioral1
Sample
c07abfc1110832eb57800e2fc2e37900.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c07abfc1110832eb57800e2fc2e37900.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
/tbu04289/adanad.com.dll
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
/tbu04289/adanad.com.dll
Resource
win10v2004-20240226-en
Behavioral task
behavioral5
Sample
/tbu04289/tbhelper.dll
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
/tbu04289/tbhelper.dll
Resource
win10v2004-20240226-en
Target
c07abfc1110832eb57800e2fc2e37900
Size
329KB
MD5
c07abfc1110832eb57800e2fc2e37900
SHA1
7a17f4882bf55f1f092495a294c46098272a8d8b
SHA256
0617a461a02efb16e0c34f099238f57d4fa21d01ee5571284000eb64583681fb
SHA512
481a43a4d2faa478f720df28287a25f618ef1f2a90dcf7f6b23bfdac0632c66573b23c1b3b1f27b04c561da9ff676bb008cefc43572974eae57d3eb35055f774
SSDEEP
6144:WGeaNg2KqJEZ0mwRreZ0sv2zEMQVChmMXJRXBqogsxPUAW2NK:WGeR+teZ0sezEPVgPVgsBWX
Checks for missing Authenticode signature.
resource |
---|
c07abfc1110832eb57800e2fc2e37900 |
unpack001//tbu04289/adanad.com.dll |
unpack001//tbu04289/tbhelper.dll |
resource | yara_rule |
---|---|
sample | nsis_installer_1 |
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
ImageList_Create
ord17
ImageList_AddMasked
ImageList_Destroy
GetExitCodeProcess
WaitForSingleObject
ExpandEnvironmentStringsA
GetEnvironmentVariableA
lstrcmpiA
FindNextFileA
DeleteFileA
FindFirstFileA
SetFileTime
GetFileAttributesA
CompareFileTime
SearchPathA
GetShortPathNameA
GetFullPathNameA
MoveFileA
lstrcatA
SetCurrentDirectoryA
CreateDirectoryA
SetFileAttributesA
CreateFileA
GetFileSize
GetModuleFileNameA
GetTickCount
CopyFileA
SetErrorMode
lstrcpynA
GetCommandLineA
GetWindowsDirectoryA
GetTempPathA
GetUserDefaultLangID
GetDiskFreeSpaceA
GetVersion
GlobalUnlock
GlobalLock
GlobalAlloc
CreateProcessA
RemoveDirectoryA
GetTempFileNameA
SetEndOfFile
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
lstrcpyA
lstrlenA
GetSystemDirectoryA
EnterCriticalSection
Sleep
LeaveCriticalSection
InitializeCriticalSection
CloseHandle
GlobalFree
GetModuleHandleA
LoadLibraryA
CreateThread
GetProcAddress
FreeLibrary
MultiByteToWideChar
GetCurrentProcess
WritePrivateProfileStringA
GetPrivateProfileStringA
WriteFile
ReadFile
SetFilePointer
FindClose
MulDiv
ExitProcess
CreateDialogParamA
DialogBoxParamA
GetClassInfoA
CreateWindowExA
SystemParametersInfoA
RegisterClassA
EndDialog
SetFocus
ScreenToClient
GetWindowRect
GetWindowLongA
SetClassLongA
IsWindowEnabled
SetWindowPos
LoadCursorA
SetCursor
GetDlgItemTextA
MapWindowPoints
GetMessagePos
LoadBitmapA
CallWindowProcA
CloseClipboard
SetClipboardData
EmptyClipboard
OpenClipboard
TrackPopupMenu
AppendMenuA
CreatePopupMenu
GetSystemMetrics
SetDlgItemTextA
MessageBoxA
CharPrevA
DestroyWindow
SetTimer
SetForegroundWindow
ShowWindow
CharNextA
wsprintfA
SendMessageTimeoutA
FindWindowExA
IsWindow
GetDlgItem
GetSysColor
SetWindowLongA
LoadImageA
GetDC
EnableWindow
PeekMessageA
DispatchMessageA
ExitWindowsEx
PostQuitMessage
SendMessageA
DefWindowProcA
BeginPaint
GetClientRect
FillRect
GetWindowTextA
DrawTextA
EndPaint
InvalidateRect
SetBkColor
GetDeviceCaps
CreateFontIndirectA
DeleteObject
CreateSolidBrush
CreateFontA
SetBkMode
SetTextColor
CreateBrushIndirect
SelectObject
RegEnumValueA
RegEnumKeyA
RegQueryValueExA
RegSetValueExA
RegDeleteKeyA
RegOpenKeyExA
RegDeleteValueA
RegCreateKeyA
RegCloseKey
ShellExecuteA
SHBrowseForFolderA
SHGetPathFromIDListA
SHGetMalloc
SHGetSpecialFolderLocation
SHFileOperationA
OleInitialize
OleUninitialize
CoCreateInstance
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueA
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PlaySoundA
SetupIterateCabinetA
DeleteFileA
WriteFile
CopyFileA
MoveFileA
GetTempFileNameA
FindFirstFileA
FindNextFileA
FindClose
GlobalFree
GlobalAlloc
lstrcmpA
GetVersion
Sleep
GetTickCount
GetShortPathNameA
DisableThreadLibraryCalls
InitializeCriticalSection
HeapDestroy
DeleteCriticalSection
ReadFile
HeapSize
TerminateProcess
GetOEMCP
GetACP
GetCPInfo
FatalAppExitA
ExitProcess
GetCommandLineA
RaiseException
GetLocalTime
GetSystemTime
GetTimeZoneInformation
GetFullPathNameA
GetCurrentDirectoryA
SetEnvironmentVariableA
MoveFileExA
TlsSetValue
CreateThread
ResumeThread
HeapReAlloc
RtlUnwind
LocalFree
InterlockedExchange
VirtualAlloc
GetEnvironmentVariableA
HeapCreate
TlsAlloc
TlsFree
TlsGetValue
UnhandledExceptionFilter
GetDriveTypeA
SetHandleCount
GetStdHandle
GetFileType
GetStartupInfoA
SetFilePointer
LCMapStringA
LCMapStringW
FreeEnvironmentStringsA
RemoveDirectoryA
lstrcatA
lstrcpyA
FreeLibrary
WinExec
GlobalLock
GlobalUnlock
OpenProcess
CreateFileA
GetModuleFileNameA
ReadProcessMemory
IsBadReadPtr
FormatMessageA
lstrcpynA
GetCurrentProcessId
IsBadWritePtr
IsBadCodePtr
SetUnhandledExceptionFilter
DebugBreak
LoadLibraryA
SetCurrentDirectoryA
GetTempPathA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
FlushFileBuffers
IsValidLocale
IsValidCodePage
GetLocaleInfoA
EnumSystemLocalesA
GetUserDefaultLCID
SetStdHandle
SetConsoleCtrlHandler
SetEndOfFile
GetLocaleInfoW
CompareStringA
CompareStringW
CreateDirectoryA
MultiByteToWideChar
WideCharToMultiByte
lstrlenW
HeapFree
GetProcessHeap
HeapAlloc
CloseHandle
GetCurrentThread
GetVersionExA
GetCurrentProcess
FlushInstructionCache
GetCurrentThreadId
lstrlenA
InterlockedIncrement
GetModuleHandleW
GetModuleHandleA
GetProcAddress
GetModuleFileNameW
LoadLibraryW
OutputDebugStringA
GetLastError
SetLastError
EnterCriticalSection
LeaveCriticalSection
InterlockedDecrement
GetStringTypeA
GetStringTypeW
ExitThread
VirtualFree
OffsetRect
GetMenuItemInfoA
EnableMenuItem
LoadMenuA
GetSubMenu
InsertMenuA
PeekMessageA
GetMessagePos
LoadBitmapA
DrawFrameControl
GetCursorPos
PostMessageA
GetMenu
AdjustWindowRectEx
KillTimer
UpdateWindow
DrawTextA
LoadImageA
IsWindowVisible
SetWindowsHookExA
TrackPopupMenu
UnhookWindowsHookEx
EndMenu
GetDlgItem
IsChild
ClientToScreen
GetAsyncKeyState
SetWindowRgn
DrawEdge
InflateRect
SetCapture
RedrawWindow
InvalidateRgn
IsWindowEnabled
ReleaseCapture
CreateAcceleratorTableA
GetDC
ReleaseDC
BeginPaint
FillRect
EndPaint
GetSysColor
SystemParametersInfoA
MapWindowPoints
RegisterHotKey
UnregisterHotKey
RegisterWindowMessageA
GetDesktopWindow
SetWindowPos
GetWindow
GetDlgCtrlID
UnregisterClassA
DialogBoxIndirectParamA
WindowFromPoint
CallNextHookEx
SetCursor
ScreenToClient
PtInRect
GetKeyState
GetClassNameA
DestroyCursor
SetDlgItemTextA
IsDlgButtonChecked
CheckDlgButton
EndDialog
SetActiveWindow
SetFocus
GetWindowRect
GetClientRect
GetWindowTextA
TranslateMessage
DispatchMessageA
GetWindowTextLengthA
DrawFocusRect
InvalidateRect
GetCapture
CharUpperA
DialogBoxParamA
GetActiveWindow
SetLastErrorEx
GetWindowLongA
CharNextA
wvsprintfA
CallWindowProcA
DefWindowProcA
SetTimer
LoadCursorFromFileA
CharLowerA
OpenClipboard
EmptyClipboard
CloseClipboard
MessageBoxA
CreateWindowExA
SetWindowLongA
LoadStringA
GetParent
GetClassInfoExA
RegisterClassExA
LoadCursorA
wsprintfA
ShowWindow
MoveWindow
SetWindowTextA
SendMessageA
GetFocus
IsWindow
DestroyWindow
DestroyMenu
CreatePopupMenu
AppendMenuA
GetSystemMetrics
CopyRect
RestoreDC
SetBkColor
CreateRectRgn
SetBkMode
GetTextMetricsA
CreateBrushIndirect
CreateRectRgnIndirect
CreatePatternBrush
SelectClipRgn
GetClipBox
GetTextExtentPoint32A
SelectObject
ExtTextOutA
CreateFontA
DeleteObject
DeleteDC
BitBlt
CreateCompatibleDC
CreateCompatibleBitmap
CreateSolidBrush
GetDeviceCaps
GetObjectA
GetStockObject
GetTextExtentPointA
SetTextColor
SaveDC
GetSidIdentifierAuthority
RegEnumKeyExA
RegEnumValueA
RegDeleteValueA
RegCloseKey
RegOpenKeyExA
FreeSid
EqualSid
AllocateAndInitializeSid
GetTokenInformation
OpenProcessToken
OpenThreadToken
GetSidSubAuthority
GetSidSubAuthorityCount
RegSetValueExA
IsValidSid
RegSetKeySecurity
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegGetKeySecurity
RegDeleteKeyA
RegEnumKeyA
GetUserNameA
RegQueryValueExA
RegCreateKeyExA
SHAddToRecentDocs
ShellExecuteA
DragQueryFileA
SHEmptyRecycleBinA
StringFromCLSID
CoTaskMemFree
OleLockRunning
CoTaskMemAlloc
CLSIDFromString
CLSIDFromProgID
OleInitialize
CreateStreamOnHGlobal
OleUninitialize
ReleaseStgMedium
RegisterDragDrop
CoCreateInstance
CoInitialize
CoUninitialize
CoCreateGuid
GetErrorInfo
SysFreeString
SysAllocStringByteLen
SysStringLen
VariantInit
SysStringByteLen
SysAllocStringLen
SysAllocString
VariantClear
LoadTypeLi
OleCreateFontIndirect
LoadRegTypeLi
SafeArrayDestroy
SafeArrayUnaccessData
SafeArrayAccessData
SafeArrayCreateVector
DispCallFunc
VariantCopy
VariantChangeType
SafeArrayPutElement
SafeArrayCreate
RegisterTypeLi
SetErrorInfo
CreateErrorInfo
FindCloseUrlCache
DeleteUrlCacheEntry
FindNextUrlCacheEntryA
FindFirstUrlCacheEntryA
PathFileExistsA
PathRemoveFileSpecA
SymFunctionTableAccess
SymGetLineFromAddr
SymGetSymFromAddr
SymGetModuleBase
SymSetOptions
SymGetOptions
SymCleanup
SymLoadModule
SymInitialize
StackWalk
CanReload
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
TBStudioReg
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
CreateFileA
DeleteFileA
InterlockedIncrement
InterlockedDecrement
DisableThreadLibraryCalls
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
HeapDestroy
DeleteCriticalSection
lstrlenW
MultiByteToWideChar
GetShortPathNameA
GetModuleFileNameA
WriteFile
GetProcAddress
LoadLibraryA
lstrcpyA
lstrcatA
WideCharToMultiByte
GlobalUnlock
GlobalLock
SetEnvironmentVariableA
CompareStringW
CompareStringA
GetLocaleInfoW
SetConsoleCtrlHandler
SetEndOfFile
ReadFile
TerminateThread
CloseHandle
CreateThread
Sleep
FreeLibrary
lstrlenA
UnhandledExceptionFilter
IsBadCodePtr
IsBadReadPtr
SetStdHandle
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
GetUserDefaultLCID
EnumSystemLocalesA
GetLocaleInfoA
IsValidCodePage
IsValidLocale
FlushFileBuffers
SetFilePointer
SetUnhandledExceptionFilter
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetStartupInfoA
GetFileType
GetStdHandle
SetHandleCount
HeapSize
GetLastError
LocalFree
InterlockedExchange
RtlUnwind
HeapReAlloc
HeapAlloc
GetTimeZoneInformation
GetSystemTime
GetLocalTime
GetCommandLineA
GetVersion
RaiseException
HeapFree
ExitProcess
FatalAppExitA
GetCPInfo
GetACP
GetOEMCP
GetCurrentThreadId
TlsSetValue
TlsAlloc
TlsFree
SetLastError
TlsGetValue
GetCurrentThread
VirtualFree
VirtualAlloc
IsBadWritePtr
GetModuleHandleA
GetEnvironmentVariableA
GetVersionExA
HeapCreate
TerminateProcess
GetCurrentProcess
CloseClipboard
CharLowerA
OpenClipboard
LoadStringA
GetClipboardData
CharNextA
RegSetValueExA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegCreateKeyExA
CoInitialize
CoCreateInstance
RegisterTypeLi
VariantChangeType
SetErrorInfo
GetErrorInfo
SysFreeString
SysAllocString
LoadTypeLi
CreateErrorInfo
LoadRegTypeLi
SysStringLen
VariantClear
VariantInit
SysAllocStringLen
InternetOpenA
InternetCloseHandle
InternetOpenUrlA
HttpQueryInfoA
InternetReadFile
PathFileExistsA
UuidFromStringA
URLDownloadToFileA
CreateHelperObject
DllCanUnloadNow
DllGetClassObject
DllRegisterServer
DllUnregisterServer
IsUnicode
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ