AcroRd32Info.pdb
Static task
static1
Behavioral task
behavioral1
Sample
98842eb74110ddaadca9212c4bf62ec5e06f7380c81727150a5d9e43a960ab1a.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
98842eb74110ddaadca9212c4bf62ec5e06f7380c81727150a5d9e43a960ab1a.exe
Resource
win10v2004-20240419-en
General
-
Target
98842eb74110ddaadca9212c4bf62ec5e06f7380c81727150a5d9e43a960ab1a
-
Size
1.7MB
-
MD5
23e607f6c0cdc8a022d394678be459bc
-
SHA1
918b70af039cba08159f5f124fcaa525dd5aa775
-
SHA256
98842eb74110ddaadca9212c4bf62ec5e06f7380c81727150a5d9e43a960ab1a
-
SHA512
fa9583d5e7eeda245e7008fa57676bac9dc61b0732271fcac5049fa0874e1f9819e1a31c10df4acd60a9a8a5619e7efdc35e0eda71c00018d54960087c088b6b
-
SSDEEP
24576:JflwnnlTJYdkEflwnnlTJYdkEflwnnlTJYdkEflwnnlTJYdNLfUT:U1X1X1X6LfUT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 98842eb74110ddaadca9212c4bf62ec5e06f7380c81727150a5d9e43a960ab1a
Files
-
98842eb74110ddaadca9212c4bf62ec5e06f7380c81727150a5d9e43a960ab1a.exe windows:5 windows x86 arch:x86
403f7818ea58345ded632cf7b4721f30
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
HeapSetInformation
GetCurrentProcess
GetProcAddress
GetModuleHandleW
GetModuleHandleA
GetFileAttributesW
GetVersionExW
LoadLibraryW
GetLastError
SetLastError
OutputDebugStringA
SetUnhandledExceptionFilter
GetProcessHeap
FreeLibrary
GetVersion
GetModuleFileNameW
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
DecodePointer
IsDebuggerPresent
UnhandledExceptionFilter
TerminateProcess
EncodePointer
GetStartupInfoW
InterlockedCompareExchange
Sleep
GetSystemTimeAsFileTime
InterlockedExchange
advapi32
RegQueryValueExA
RegCloseKey
RegOpenKeyExA
msvcr100
exit
_wcmdln
_initterm
_initterm_e
_configthreadlocale
__setusermatherr
_commode
_fmode
__set_app_type
_crt_debugger_hook
?terminate@@YAXXZ
_unlock
__dllonexit
_lock
_onexit
_invoke_watson
_controlfp_s
_XcptFilter
_cexit
__wgetmainargs
_amsg_exit
_except_handler4_common
wcsstr
memset
_get_heap_handle
malloc
wcsrchr
wcsncpy_s
free
wcsncat_s
_exit
Sections
.text Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 956B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1024B - Virtual size: 720B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ