f:\CB\ARM_Sustaining\BuildResults\bin\Win32\Release\AdobeARMHelper.pdb
Static task
static1
Behavioral task
behavioral1
Sample
fec47fec1a8cdf3d653d138b138486f4d752918fe3915a6a71c7c25ca520e254N.exe
Resource
win7-20241010-en
General
-
Target
fec47fec1a8cdf3d653d138b138486f4d752918fe3915a6a71c7c25ca520e254N.exe
-
Size
417KB
-
MD5
b94f87ac6feabdedf683dce477390320
-
SHA1
3da576d908bb47722f36d2564c7b3d39939355f7
-
SHA256
fec47fec1a8cdf3d653d138b138486f4d752918fe3915a6a71c7c25ca520e254
-
SHA512
7eec6a625ddf571b268e6290a495c3968d080fb2451a6dbd4ae97c7ad5ada348723db1a7387a18734aa124f76b47d0c56de44f5a2446763009e06ab67d770507
-
SSDEEP
6144:GWb6GdYJGY1CLKd6Gr5xZH8XL7k19X0eTLE9AIHR1y9X9bk/0fkU/ADpWE6r:GWbvhLq6y3H8X3k1liabe0fk2AD8t
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource fec47fec1a8cdf3d653d138b138486f4d752918fe3915a6a71c7c25ca520e254N.exe
Files
-
fec47fec1a8cdf3d653d138b138486f4d752918fe3915a6a71c7c25ca520e254N.exe.exe windows:5 windows x86 arch:x86
d4d812a56b78d38330998cf86ac74da8
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
psapi
EnumProcesses
EnumProcessModules
GetModuleFileNameExW
GetModuleBaseNameW
msi
ord70
userenv
CreateEnvironmentBlock
DestroyEnvironmentBlock
UnloadUserProfile
kernel32
WriteFile
SetFilePointer
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
GetFileSize
DuplicateHandle
GetVolumeInformationW
GetFullPathNameW
GetModuleFileNameW
GetProcAddress
GetModuleHandleW
InterlockedDecrement
FreeLibrary
lstrlenA
ReadFile
GetCurrentProcessId
LeaveCriticalSection
TlsGetValue
EnterCriticalSection
GlobalReAlloc
GlobalHandle
InitializeCriticalSection
TlsAlloc
TlsSetValue
LocalReAlloc
DeleteCriticalSection
TlsFree
InterlockedIncrement
CompareStringW
GetFileSizeEx
GetFileTime
GlobalFlags
GetCurrentThreadId
GlobalAddAtomW
GetModuleHandleA
GetVersionExA
LoadLibraryA
GlobalDeleteAtom
GlobalFindAtomW
CompareStringA
GetSystemTimeAsFileTime
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetStartupInfoW
HeapReAlloc
RtlUnwind
RaiseException
SetStdHandle
GetFileType
HeapSize
ExitProcess
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
HeapCreate
VirtualFree
VirtualAlloc
GetStdHandle
GetModuleFileNameA
LCMapStringW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetStartupInfoA
QueryPerformanceCounter
GetTickCount
GetTimeZoneInformation
InitializeCriticalSectionAndSpinCount
GetConsoleCP
GetConsoleMode
LCMapStringA
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
GetCurrentDirectoryA
GetDriveTypeA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
SetEnvironmentVariableA
LoadLibraryW
FileTimeToLocalFileTime
FileTimeToSystemTime
FindNextFileW
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
WideCharToMultiByte
DeleteFileW
MoveFileW
LocalAlloc
FindClose
lstrcmpW
FindFirstFileW
lstrcmpA
SetFileAttributesW
CreateFileW
CopyFileW
CreateThread
LocalFree
CloseHandle
CreateToolhelp32Snapshot
Process32NextW
LockResource
Process32FirstW
GetLocalTime
SetLastError
GetLongPathNameW
GetLastError
GetTempPathW
lstrlenW
MultiByteToWideChar
GetFileAttributesW
GetExitCodeProcess
GetVersionExW
FormatMessageW
SizeofResource
Sleep
OpenProcess
GetPrivateProfileStringW
GetProcessHeap
GetCurrentThread
WaitForSingleObject
HeapFree
GetCurrentProcess
HeapAlloc
CreateProcessW
LoadResource
FindResourceW
user32
EnableMenuItem
ModifyMenuW
LoadBitmapW
GetMenuCheckMarkDimensions
SetMenuItemBitmaps
PostQuitMessage
DestroyMenu
DestroyWindow
GetMessageTime
GetMessagePos
MapWindowPoints
SetMenu
SetForegroundWindow
GetClientRect
PostMessageW
CreateWindowExW
GetClassInfoExW
GetClassInfoW
RegisterClassW
AdjustWindowRectEx
DefWindowProcW
CallWindowProcW
CopyRect
GetMenu
CheckMenuItem
SystemParametersInfoA
IsIconic
GetWindowPlacement
GrayStringW
DrawTextExW
DrawTextW
TabbedTextOutW
SetWindowsHookExW
CallNextHookEx
DispatchMessageW
GetKeyState
PeekMessageW
ValidateRect
SetWindowPos
SetWindowLongW
IsWindow
ClientToScreen
GetWindow
GetDlgCtrlID
GetWindowRect
GetClassNameW
PtInRect
LoadCursorW
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
GetWindowThreadProcessId
SendMessageW
GetParent
MessageBoxW
GetForegroundWindow
SetWindowTextW
GetDlgItem
GetWindowLongW
GetLastActivePopup
IsWindowEnabled
EnableWindow
GetWindowTextW
RegisterWindowMessageW
LoadIconW
WinHelpW
FindWindowW
GetCapture
GetClassLongW
SetPropW
GetPropW
RemovePropW
GetTopWindow
GetSubMenu
GetMenuItemCount
UnhookWindowsHookEx
CharUpperW
GetSystemMetrics
GetMenuState
GetMenuItemID
GetFocus
advapi32
GetSidLengthRequired
CryptHashData
ConvertSidToStringSidW
CryptDestroyHash
CryptCreateHash
GetNamedSecurityInfoW
SetNamedSecurityInfoW
RegDeleteKeyW
CryptReleaseContext
CryptAcquireContextW
CryptGetHashParam
RegSetValueExW
RegCloseKey
CheckTokenMembership
GetLengthSid
InitializeSid
RegOpenKeyExW
IsValidSid
RegEnumValueW
RegDeleteValueW
DuplicateTokenEx
LookupAccountSidW
RegQueryInfoKeyW
DuplicateToken
CreateProcessAsUserW
RegQueryValueExW
RegCreateKeyExW
CopySid
GetTokenInformation
RegCreateKeyW
OpenThreadToken
GetSidSubAuthority
OpenProcessToken
shell32
SHChangeNotify
ShellExecuteW
SHGetFolderPathW
ole32
CoTaskMemFree
CoInitialize
CoCreateInstance
CoUninitialize
shlwapi
PathIsUNCW
PathFindFileNameW
PathStripToRootW
crypt32
CertCloseStore
CertFindCertificateInStore
CertFreeCertificateContext
CertGetNameStringW
CryptQueryObject
CryptDecodeObject
CryptMsgClose
CryptMsgGetParam
wintrust
WinVerifyTrust
oleacc
CreateStdAccessibleObject
LresultFromObject
gdi32
GetStockObject
CreateBitmap
DeleteDC
ScaleWindowExtEx
SetBkColor
RestoreDC
SetMapMode
GetClipBox
SetTextColor
SaveDC
DeleteObject
GetDeviceCaps
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutW
TextOutW
RectVisible
PtVisible
SetWindowExtEx
winspool.drv
DocumentPropertiesW
ClosePrinter
OpenPrinterW
comdlg32
GetFileTitleW
oleaut32
VariantInit
VariantClear
VariantChangeType
Sections
.text Size: 201KB - Virtual size: 200KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 55KB - Virtual size: 55KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 8KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 41KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 102KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE