Static task
static1
Behavioral task
behavioral1
Sample
adeddfba7ca696926f5ae2696771cd60N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
adeddfba7ca696926f5ae2696771cd60N.exe
Resource
win10v2004-20240802-en
General
-
Target
adeddfba7ca696926f5ae2696771cd60N.exe
-
Size
6.6MB
-
MD5
adeddfba7ca696926f5ae2696771cd60
-
SHA1
448d7723e4a78363ea5793513bb7a4b09d972088
-
SHA256
c5ecc8122c542906d8cb907b48f49087a75409094fdd829de3e0da174249bfd6
-
SHA512
7074f504dc7f75031456f1af8ad1162279f706905c2facb95194b625b37395acdd3f8271cd273cb8105807182e0aa2350a6148fefa4e45d99bc7baf3c551e1f9
-
SSDEEP
196608:wcMv19wbFFmrN+a/Fjfn+sbC93NcsLjCb:m2bXmrN+a/xGsbm3NnLj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource adeddfba7ca696926f5ae2696771cd60N.exe
Files
-
adeddfba7ca696926f5ae2696771cd60N.exe.exe windows:6 windows x86 arch:x86
ad15d455230fa93a26641da2164f9778
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadResource
SystemTimeToTzSpecificLocalTime
VerSetConditionMask
GetCommState
GetCurrentProcess
QueryPerformanceCounter
CreateDirectoryW
GetModuleHandleExW
ConnectNamedPipe
WaitForSingleObjectEx
VirtualFree
GetWindowsDirectoryA
GetUserDefaultLangID
SetCommState
GetProcessTimes
GetConsoleCP
GetSystemDirectoryW
LoadLibraryW
Sleep
SizeofResource
CreateEventA
GetSystemTimeAdjustment
HeapDestroy
lstrcpynW
FileTimeToSystemTime
GetModuleFileNameW
CompareStringW
GetACP
SetThreadPriority
GlobalUnlock
FlushFileBuffers
GetTempPathW
GetPrivateProfileIntW
IsDBCSLeadByteEx
GetThreadLocale
CreateNamedPipeA
EnterCriticalSection
GetDiskFreeSpaceW
FindClose
GetLocalTime
LockResource
CreateEventW
RemoveDirectoryW
EnumResourceTypesW
GetOEMCP
GetModuleHandleA
FindNextFileW
GetStringTypeW
VirtualProtect
GetUserDefaultUILanguage
DeleteCriticalSection
WinExec
TlsAlloc
CloseHandle
GetWindowsDirectoryW
GetVersion
DeleteFileW
OpenFileMappingA
GetSystemDefaultUILanguage
lstrcpyW
ExpandEnvironmentStringsW
CreateThread
SwitchToThread
SetStdHandle
SetFilePointerEx
GetConsoleMode
LCMapStringW
UnregisterWaitEx
QueryDepthSList
InterlockedFlushSList
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
ReleaseSemaphore
VirtualAlloc
FreeLibraryAndExitThread
FreeLibrary
GetThreadTimes
OutputDebugStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCurrentProcessId
WriteFile
GetStdHandle
IsValidCodePage
IsDebuggerPresent
GetProcessHeap
HeapAlloc
HeapSize
UnregisterWait
RegisterWaitForSingleObject
SetThreadAffinityMask
GetProcessAffinityMask
GetNumaHighestNodeNumber
DeleteTimerQueueTimer
WriteConsoleW
ChangeTimerQueueTimer
CreateTimerQueueTimer
GetLogicalProcessorInformation
GetThreadPriority
SignalObjectAndWait
SetEvent
CreateTimerQueue
HeapFree
LoadLibraryExW
ExitThread
CreateSemaphoreW
VirtualQuery
GetCPInfo
GetDriveTypeW
UnmapViewOfFile
RtlCaptureContext
TlsGetValue
SetFilePointer
FindFirstFileW
GetTempFileNameW
GetDateFormatW
ExitProcess
GetFullPathNameW
FindFirstFileA
WideCharToMultiByte
GetSystemTimeAsFileTime
EnumSystemLocalesW
FileTimeToLocalFileTime
GetModuleFileNameA
CreatePipe
GetSystemInfo
QueryDosDeviceW
GetExitCodeThread
GetFileType
ResetEvent
GetCPInfoExW
WritePrivateProfileStringW
GetStartupInfoW
MultiByteToWideChar
CreateProcessA
CreateFileW
LeaveCriticalSection
GetVersionExW
IsValidLocale
InitializeCriticalSectionAndSpinCount
SetCommTimeouts
ExpandEnvironmentStringsA
GetCurrentThread
WaitForSingleObject
GetUserDefaultLCID
GlobalLock
SetHandleInformation
WaitNamedPipeA
SystemTimeToFileTime
FindResourceW
CreateFileA
EnumResourceNamesW
SuspendThread
GetEnvironmentVariableW
GetProcAddress
GetModuleHandleW
GetTickCount
TlsFree
TlsSetValue
TerminateProcess
SetLastError
SetUnhandledExceptionFilter
UnhandledExceptionFilter
IsProcessorFeaturePresent
RtlUnwind
RaiseException
GetCommandLineW
HeapReAlloc
GetLastError
DecodePointer
EncodePointer
GetCurrentThreadId
DuplicateHandle
user32
CheckMenuItem
GetWindowThreadProcessId
SetMenuItemInfoW
EndPaint
ClientToScreen
CharUpperBuffW
GetMessageW
IsIconic
PostMessageW
GetSubMenu
CharLowerBuffW
GetMenuItemInfoW
ModifyMenuW
EnumWindows
CreateIconIndirect
CreateDialogIndirectParamA
SetDlgItemInt
CheckMenuRadioItem
MessageBoxA
LoadMenuW
GetWindowTextW
MonitorFromWindow
ShowWindow
CreateWindowExW
MessageBoxW
GetDlgItemTextW
SendMessageW
UpdateWindow
EndMenu
DestroyMenu
GetDlgCtrlID
SetWindowTextW
GetMonitorInfoW
GetWindow
IsRectEmpty
DrawFocusRect
GetDC
GetMenu
GetWindowLongW
GetClassNameW
DrawStateW
DestroyCursor
GetDesktopWindow
DrawMenuBar
EnableScrollBar
InsertMenuW
SetDlgItemTextW
ValidateRgn
MapWindowPoints
DestroyIcon
DrawFrameControl
InflateRect
gdi32
PolyPolygon
SetLayout
GetTextExtentPoint32W
ExtFloodFill
SetWindowExtEx
GetMetaFileBitsEx
SetTextColor
PtInRegion
PlayEnhMetaFile
OffsetRgn
SetPolyFillMode
StretchDIBits
GetBkColor
GetObjectW
GetNearestPaletteIndex
CreatePatternBrush
SetViewportExtEx
SetWinMetaFileBits
Arc
SetViewportOrgEx
CreateHatchBrush
CreateFontIndirectW
StretchBlt
GetRgnBox
GetEnhMetaFileHeader
CombineRgn
SetStretchBltMode
CloseEnhMetaFile
SetWindowOrgEx
comdlg32
GetSaveFileNameW
GetOpenFileNameW
FindTextW
advapi32
RegLoadKeyW
AdjustTokenPrivileges
SetSecurityDescriptorOwner
RegOpenKeyExA
LookupPrivilegeValueW
RegDeleteKeyA
RegQueryInfoKeyW
RegQueryValueExW
OpenSCManagerW
OpenProcessToken
RegOpenKeyExW
RegConnectRegistryW
RegSetValueExW
shell32
Shell_NotifyIconW
ShellExecuteW
CommandLineToArgvW
SHGetFileInfoW
ShellExecuteExW
ole32
CoTaskMemFree
CoInitialize
oleaut32
SysFreeString
SysAllocStringLen
VariantInit
VariantCopy
SafeArrayGetLBound
SysReAllocStringLen
SafeArrayGetUBound
VariantClear
Sections
.text Size: 668KB - Virtual size: 667KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 6.0MB - Virtual size: 6.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.fTud Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 13KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ