Static task
static1
Behavioral task
behavioral1
Sample
ad14b04c4c926fd772ee69800899fd3aa1375b005d7a99bea78f8ba3a2ef77f3.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ad14b04c4c926fd772ee69800899fd3aa1375b005d7a99bea78f8ba3a2ef77f3.exe
Resource
win10v2004-20240412-en
General
-
Target
ad14b04c4c926fd772ee69800899fd3aa1375b005d7a99bea78f8ba3a2ef77f3
-
Size
1.0MB
-
MD5
b55ecd0d2f8861d40b4c8e4387594560
-
SHA1
fb9c6647d1d41c50da41ea9bce92f15ce3318b69
-
SHA256
ad14b04c4c926fd772ee69800899fd3aa1375b005d7a99bea78f8ba3a2ef77f3
-
SHA512
662e163d6d14bdc91d3a899cfec4a8f91b1409910ff5d62d45205c887fa817ca4a7877ca3138c2548758133c1419eae90aa1ff78b27098bdc3f411fb8d42f88d
-
SSDEEP
24576:jCKARdyUl8RJvzGk9Cs/iM6S04tEX0ioC16CxofeRM4ZIBlGTL1SIWZg4M:42Ul4vfgqA4IWs
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ad14b04c4c926fd772ee69800899fd3aa1375b005d7a99bea78f8ba3a2ef77f3
Files
-
ad14b04c4c926fd772ee69800899fd3aa1375b005d7a99bea78f8ba3a2ef77f3.exe windows:4 windows x86 arch:x86
0e7f43393080b0e577979848ab4b328e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_DEBUG_STRIPPED
Imports
comctl32
InitCommonControls
gdi32
ChoosePixelFormat
GetDeviceCaps
GetDeviceGammaRamp
SetDeviceGammaRamp
SetPixelFormat
SwapBuffers
kernel32
AllocConsole
CloseHandle
CreateEventA
CreateThread
ExitProcess
FreeConsole
FreeLibrary
GetCommandLineA
GetConsoleScreenBufferInfo
GetLargestConsoleWindowSize
GetModuleFileNameA
GetModuleHandleA
GetNumberOfConsoleInputEvents
GetProcAddress
GetStartupInfoA
GetStdHandle
GlobalAlloc
GlobalFree
GlobalLock
GlobalMemoryStatus
GlobalSize
GlobalUnlock
LoadLibraryA
MapViewOfFile
QueryPerformanceCounter
QueryPerformanceFrequency
ReadConsoleInputA
ReadConsoleOutputCharacterA
SetConsoleScreenBufferSize
SetConsoleWindowInfo
SetEvent
SetUnhandledExceptionFilter
Sleep
UnmapViewOfFile
WaitForMultipleObjects
WriteConsoleInputA
WriteFile
msvcrt
_close
_dup
_lseek
_open
_read
_stricmp
_strnicmp
_unlink
_write
__getmainargs
__p__environ
__set_app_type
_cexit
_fileno
_findclose
_findfirst
_findnext
_fmode
_fpreset
_iob
_mkdir
_setjmp
_setmode
_vsnprintf
atan
atan2
atexit
atof
atoi
ceil
exit
exp
floor
free
isalpha
isdigit
isupper
localtime
log
longjmp
malloc
memcpy
memmove
memset
pow
rand
signal
sprintf
srand
sscanf
strcat
strchr
strcmp
strcpy
strftime
strncmp
strncpy
strrchr
strstr
strtok
strtol
tan
time
tolower
toupper
user32
AdjustWindowRectEx
ChangeDisplaySettingsA
ClipCursor
CloseClipboard
CreateWindowExA
DefWindowProcA
DestroyWindow
DispatchMessageA
GetClipboardData
GetCursorPos
GetDC
GetKeyboardState
GetMessageA
GetSystemMetrics
LoadCursorA
LoadIconA
MessageBoxA
MoveWindow
OpenClipboard
PeekMessageA
RegisterClassA
RegisterWindowMessageA
ReleaseCapture
ReleaseDC
SetCapture
SetCursorPos
SetForegroundWindow
SetWindowPos
ShowCursor
ShowWindow
SystemParametersInfoA
ToAscii
TranslateMessage
UpdateWindow
winmm
joyGetDevCapsA
joyGetNumDevs
joyGetPosEx
mciSendCommandA
timeBeginPeriod
timeGetTime
waveOutClose
waveOutOpen
waveOutPrepareHeader
waveOutReset
waveOutUnprepareHeader
waveOutWrite
wsock32
WSACleanup
WSAGetLastError
WSAStartup
bind
closesocket
gethostbyname
getsockname
htons
ioctlsocket
ntohs
recvfrom
sendto
setsockopt
socket
Sections
.text Size: 935KB - Virtual size: 935KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 64KB - Virtual size: 63KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 45.5MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 65KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE