D:\DCB\CBT_Main\BuildResults\bin\Win32\Release\AdobeARMHelper.pdb
Static task
static1
Behavioral task
behavioral1
Sample
33a76166cd956d5f7a53358c2bc5461ab2298defd988598f39041e14bc24b8bd.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
33a76166cd956d5f7a53358c2bc5461ab2298defd988598f39041e14bc24b8bd.exe
Resource
win10v2004-20240802-en
General
-
Target
33a76166cd956d5f7a53358c2bc5461ab2298defd988598f39041e14bc24b8bd
-
Size
1.5MB
-
MD5
8e071a82eedf534a40d1572235f747c4
-
SHA1
6d6fedd5af0e23f9a3ed9ba8abb514f1bb9a16d6
-
SHA256
33a76166cd956d5f7a53358c2bc5461ab2298defd988598f39041e14bc24b8bd
-
SHA512
bc3ff85a5f737e927519d797756537910cc79aacc2bf0935cc9759708a2e001ad860f81bc56e93a0caec1606493d8a9467f97220ced761243ef49280524b7d30
-
SSDEEP
24576:qGmZWMDi1W7bwDRsBxk80eP8WPQHxIvxDO3YR:fmZDfIDqkEPJ4HOvhb
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 33a76166cd956d5f7a53358c2bc5461ab2298defd988598f39041e14bc24b8bd
Files
-
33a76166cd956d5f7a53358c2bc5461ab2298defd988598f39041e14bc24b8bd.exe windows:6 windows x86 arch:x86
8adadb30040f7c8f83dd61a4aaaa08ea
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
psapi
GetModuleBaseNameW
EnumProcessModules
EnumProcesses
GetModuleFileNameExW
msi
ord131
ord16
ord88
ord159
ord160
ord92
ord70
ord118
ord32
ord141
ord205
ord8
userenv
CreateEnvironmentBlock
DestroyEnvironmentBlock
UnloadUserProfile
kernel32
GetCurrentDirectoryW
ResetEvent
WaitForSingleObjectEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
GetStartupInfoW
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
LCMapStringW
GetStdHandle
ExitProcess
GetCommandLineW
GetCommandLineA
GetModuleHandleExW
HeapQueryInformation
GetFileType
SetStdHandle
RtlUnwind
OutputDebugStringW
SetEvent
GlobalFlags
WriteConsoleW
GetFileTime
GetFileSizeEx
GetFileAttributesExW
GetCurrentProcessId
LocalReAlloc
GlobalHandle
GlobalReAlloc
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
InitializeCriticalSection
CompareStringW
GlobalFindAtomW
GlobalAddAtomW
GlobalDeleteAtom
FreeLibrary
GetSystemDirectoryW
GetCurrentThreadId
EncodePointer
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
FindNextFileW
FileTimeToLocalFileTime
LoadLibraryA
LoadLibraryExW
DuplicateHandle
UnlockFile
SetEndOfFile
LockFile
GetVolumeInformationW
GetFullPathNameW
GetFileSize
FlushFileBuffers
GlobalFree
GlobalUnlock
GlobalLock
GlobalAlloc
LoadLibraryW
GetModuleHandleA
GetModuleFileNameW
InitializeCriticalSectionAndSpinCount
LeaveCriticalSection
EnterCriticalSection
OutputDebugStringA
GetACP
WideCharToMultiByte
CreateThread
lstrcmpW
lstrcmpA
LocalAlloc
FindResourceExW
SetFilePointer
FindFirstFileW
FindClose
SystemTimeToFileTime
GetSystemTime
Process32NextW
Process32FirstW
CreateToolhelp32Snapshot
MultiByteToWideChar
CopyFileW
GetProcAddress
GetModuleHandleW
GetWindowsDirectoryW
GetTickCount64
OpenProcess
CreateProcessW
GetExitCodeProcess
Sleep
CreateEventW
WaitForSingleObject
RemoveDirectoryW
ReadFile
GetLongPathNameW
MoveFileW
FormatMessageW
LocalFree
FindResourceW
SizeofResource
LockResource
LoadResource
GetLocalTime
DeleteCriticalSection
InitializeCriticalSectionEx
GetProcessHeap
HeapSize
HeapFree
HeapReAlloc
HeapAlloc
HeapDestroy
SetLastError
RaiseException
DecodePointer
GetTempPathW
SetFileAttributesW
WritePrivateProfileStringW
GetPrivateProfileStringW
lstrlenW
GetCurrentThread
GetCurrentProcess
GetLastError
CloseHandle
WriteFile
GetFileAttributesW
DeleteFileW
CreateFileW
GetConsoleCP
GetConsoleMode
ReadConsoleW
SetFilePointerEx
GetDriveTypeW
GetTimeZoneInformation
FindFirstFileExW
IsValidCodePage
GetOEMCP
GetCPInfo
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
GetStringTypeW
IsDebuggerPresent
user32
PostQuitMessage
LoadBitmapW
SetMenuItemInfoW
GetMenuCheckMarkDimensions
SetMenuItemBitmaps
EnableMenuItem
CheckMenuItem
DestroyMenu
RealChildWindowFromPoint
ClientToScreen
TabbedTextOutW
GrayStringW
DrawTextExW
DrawTextW
GetSysColorBrush
ReleaseDC
GetWindowThreadProcessId
GetForegroundWindow
MessageBoxW
IsWindowEnabled
GetMonitorInfoW
MonitorFromWindow
WinHelpW
LoadIconW
CallNextHookEx
UnhookWindowsHookEx
SetWindowsHookExW
GetLastActivePopup
GetTopWindow
GetClassNameW
GetClassLongW
SetWindowLongW
PtInRect
CopyRect
GetSysColor
MapWindowPoints
ScreenToClient
AdjustWindowRectEx
GetWindowRect
RemovePropW
GetPropW
SetPropW
GetDC
SetCursor
LoadCursorW
GetDlgItem
SetWindowTextW
FindWindowW
GetClientRect
SetRectEmpty
OffsetRect
GetParent
GetSubMenu
GetMenuItemID
GetMenuItemCount
CharUpperW
GetSystemMetrics
SendMessageW
GetScrollPos
GetWindowTextW
GetWindowLongW
GetWindow
RegisterWindowMessageW
DispatchMessageW
PeekMessageW
GetMessagePos
RedrawWindow
ValidateRect
EndPaint
BeginPaint
SetForegroundWindow
SetMenu
GetMenu
EnableWindow
GetCapture
GetKeyState
GetFocus
GetDlgCtrlID
IsIconic
EndDeferWindowPos
DeferWindowPos
BeginDeferWindowPos
SetWindowPos
DestroyWindow
IsMenu
IsWindow
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
CallWindowProcW
DefWindowProcW
PostMessageW
GetMessageTime
gdi32
ScaleWindowExtEx
ScaleViewportExtEx
OffsetViewportOrgEx
SetWindowExtEx
SetViewportOrgEx
SetViewportExtEx
ExtTextOutW
TextOutW
SetMapMode
SelectObject
SaveDC
RestoreDC
RectVisible
PtVisible
DeleteDC
GetDeviceCaps
SetBkColor
SetTextColor
CreateBitmap
DeleteObject
Escape
GetClipBox
GetStockObject
winspool.drv
DocumentPropertiesW
ClosePrinter
OpenPrinterW
advapi32
RegQueryInfoKeyW
CheckTokenMembership
OpenThreadToken
OpenProcessToken
DuplicateToken
GetLengthSid
GetSidLengthRequired
GetSidSubAuthority
InitializeSid
IsValidSid
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptGetHashParam
CryptReleaseContext
CryptAcquireContextW
SetNamedSecurityInfoW
GetNamedSecurityInfoW
ConvertSidToStringSidW
RegDeleteKeyW
RegSetValueExW
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegEnumValueW
RegDeleteValueW
RegCreateKeyExW
RegCreateKeyW
LookupAccountSidW
GetTokenInformation
GetSidSubAuthorityCount
DuplicateTokenEx
CreateProcessAsUserW
RegQueryValueExW
RegOpenKeyExW
RegCloseKey
CopySid
shell32
SHGetFolderPathW
ShellExecuteW
SHCreateDirectoryExW
SHChangeNotify
shlwapi
PathStripToRootW
PathFindFileNameW
PathIsUNCW
ole32
CoUninitialize
CoCreateInstance
CoTaskMemFree
CoInitialize
oleaut32
VariantInit
VariantClear
VariantChangeType
crypt32
CryptDecodeObject
CryptMsgClose
CryptMsgGetParam
CertCloseStore
CertFindCertificateInStore
CertFreeCertificateContext
CertGetNameStringW
CryptQueryObject
wintrust
WinVerifyTrust
oleacc
CreateStdAccessibleObject
LresultFromObject
Sections
.text Size: 231KB - Virtual size: 231KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 83KB - Virtual size: 82KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 45KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1.2MB - Virtual size: 1.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE