Behavioral task
behavioral1
Sample
c14dd4a0831ea2548e1ddfd54b9704fe8ad0057924ede041c8c064b66690a028.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
c14dd4a0831ea2548e1ddfd54b9704fe8ad0057924ede041c8c064b66690a028.exe
Resource
win10v2004-20240412-en
General
-
Target
40576b188c2853918f92214fb710a51a374dc2d502fccdb99931803e3812fbe3
-
Size
199KB
-
MD5
50e24a93beca40d77fbe0ae893f80297
-
SHA1
d5d4172d5152eb2a80ea9002543462bb3173672b
-
SHA256
40576b188c2853918f92214fb710a51a374dc2d502fccdb99931803e3812fbe3
-
SHA512
e650a52ea252ea4303ab8be67d2813b88c10537939262b6e276573c47560c726890fb348a30ad48a4e5dec91281aa6136dd043f730b8bb1570db6b6a5741281a
-
SSDEEP
6144:VcdxsPORHEzKZuxFDeivEfezTMn6V0pcIWhuJZQhQ:YeOqzKMxFDe2jzInWIW8JZiQ
Malware Config
Signatures
-
Avaddon family
-
Avaddon payload 1 IoCs
Processes:
resource yara_rule static1/unpack001/c14dd4a0831ea2548e1ddfd54b9704fe8ad0057924ede041c8c064b66690a028.exe family_avaddon -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/c14dd4a0831ea2548e1ddfd54b9704fe8ad0057924ede041c8c064b66690a028.exe
Files
-
40576b188c2853918f92214fb710a51a374dc2d502fccdb99931803e3812fbe3.zip
Password: infected
-
c14dd4a0831ea2548e1ddfd54b9704fe8ad0057924ede041c8c064b66690a028.exe.exe windows:5 windows x86 arch:x86
23a46895b7b77a6f30e685c2515257b3
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
OpenProcess
CreateToolhelp32Snapshot
Sleep
Process32NextW
Process32FirstW
CreateProcessW
OpenMutexW
GetTickCount
WaitForSingleObject
GetLocaleInfoA
GetComputerNameA
WriteConsoleW
CreateMutexW
TerminateProcess
GetLogicalDrives
FindClose
GetEnvironmentVariableW
FindNextFileW
FindFirstFileW
GetProcessHeap
MoveFileExW
SetFilePointerEx
HeapAlloc
GetLastError
SetFileAttributesW
GetFileAttributesW
HeapFree
GetFileSizeEx
ReadFile
HeapSize
GetConsoleMode
WideCharToMultiByte
CloseHandle
GetConsoleCP
FlushFileBuffers
MultiByteToWideChar
CreateFileW
WriteFile
GetDiskFreeSpaceW
GetVolumeInformationW
SetStdHandle
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetOEMCP
IsValidCodePage
GetCurrentThreadId
WaitForSingleObjectEx
GetExitCodeThread
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
QueryPerformanceCounter
EncodePointer
DecodePointer
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
GetProcAddress
GetStringTypeW
CompareStringW
LCMapStringW
GetLocaleInfoW
GetCPInfo
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
IsProcessorFeaturePresent
IsDebuggerPresent
GetStartupInfoW
GetCurrentProcessId
InitializeSListHead
SetEvent
CreateThread
GetCurrentThread
GetThreadTimes
FreeLibrary
FreeLibraryAndExitThread
LoadLibraryExW
RtlUnwind
RaiseException
ExitThread
GetModuleHandleExW
ExitProcess
GetModuleFileNameA
GetStdHandle
GetACP
GetDateFormatW
GetTimeFormatW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
HeapReAlloc
GetFileType
GetTimeZoneInformation
FindFirstFileExA
FindNextFileA
advapi32
OpenSCManagerW
CryptGenKey
CryptImportKey
CryptExportKey
CryptEncrypt
CryptAcquireContextW
CryptDestroyKey
CryptDuplicateKey
CryptSetKeyParam
CloseServiceHandle
CryptReleaseContext
ControlService
EnumDependentServicesW
OpenServiceW
QueryServiceStatusEx
shell32
SHEmptyRecycleBinW
crypt32
CryptStringToBinaryA
mpr
WNetGetConnectionW
iphlpapi
IcmpCloseHandle
GetAdaptersInfo
IcmpCreateFile
IcmpSendEcho
netapi32
NetShareEnum
NetDfsEnum
NetApiBufferFree
ws2_32
WSAStartup
inet_addr
htons
getnameinfo
WSACleanup
Sections
.text Size: 300KB - Virtual size: 299KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 153KB - Virtual size: 153KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 488B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 18KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ