Static task
static1
Behavioral task
behavioral1
Sample
ad2f0df924f04aed2a5fd1c754f3c76b1acb35e00c46aada2859aa22e9e91bbb.exe
Resource
win7-20240708-en
General
-
Target
ad2f0df924f04aed2a5fd1c754f3c76b1acb35e00c46aada2859aa22e9e91bbb
-
Size
1.9MB
-
MD5
40c963d03dddf73814b2ac37fffc3ad9
-
SHA1
3c193f74453da101fe17428962d31583cb87f7e2
-
SHA256
ad2f0df924f04aed2a5fd1c754f3c76b1acb35e00c46aada2859aa22e9e91bbb
-
SHA512
77ca773418cfc325bb4fd33922eee414da3df56e317381c4e52e4d0312d413780e77285937c42743ac84295fba82b2bd00fc8a5be3d17fb4e76905902ca44644
-
SSDEEP
49152:rxTc2H2tFvduySt6kYKy2Re589Y+wejfxYD2qQfs+RiieNXs:xcy2Lkt6kYec589YLeLxYD2qQfs+RsXs
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ad2f0df924f04aed2a5fd1c754f3c76b1acb35e00c46aada2859aa22e9e91bbb
Files
-
ad2f0df924f04aed2a5fd1c754f3c76b1acb35e00c46aada2859aa22e9e91bbb.exe windows:4 windows x86 arch:x86
d32357501b59d8d40cb2a554799505fe
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FlushFileBuffers
lstrcpynA
LocalAlloc
TlsAlloc
DeleteCriticalSection
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
GlobalFlags
WritePrivateProfileStringA
GlobalFindAtomA
GlobalAddAtomA
GetProcessVersion
SetErrorMode
GetCPInfo
GetOEMCP
RtlUnwind
RaiseException
HeapSize
GetACP
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
LCMapStringW
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadCodePtr
SetStdHandle
InterlockedExchange
LocalFree
InterlockedDecrement
InterlockedIncrement
GlobalDeleteAtom
lstrcmpA
lstrcmpiA
GetCurrentThread
GetCurrentThreadId
GetVersion
FindResourceA
LoadResource
LockResource
SizeofResource
lstrcatA
SetLastError
GlobalAlloc
lstrcpyA
LoadLibraryExA
EnumResourceNamesA
Sleep
OpenProcess
TerminateProcess
SetFileAttributesA
SetFilePointer
GlobalLock
GlobalUnlock
GlobalFree
CreateToolhelp32Snapshot
Process32First
Process32Next
WideCharToMultiByte
MultiByteToWideChar
GetCurrentProcess
GetLastError
GetVersionExA
GetWindowsDirectoryA
GetSystemDirectoryA
GetTempPathA
lstrlenA
LCMapStringA
LeaveCriticalSection
InitializeCriticalSection
EnterCriticalSection
LoadLibraryA
GetProcAddress
FreeLibrary
GetCommandLineA
CopyFileA
FindClose
FindFirstFileA
FindNextFileA
DeleteFileA
GetFileSize
ReadFile
GetModuleFileNameA
GetStartupInfoA
CreateProcessA
WaitForSingleObject
CreateFileA
WriteFile
CloseHandle
IsBadReadPtr
HeapFree
HeapReAlloc
HeapAlloc
ExitProcess
GetModuleHandleA
GetProcessHeap
EndUpdateResourceA
UpdateResourceA
RtlMoveMemory
lstrcpynW
BeginUpdateResourceA
GlobalGetAtomNameA
user32
GetTopWindow
CopyRect
GetClientRect
AdjustWindowRectEx
GetSysColor
MapWindowPoints
LoadIconA
LoadCursorA
GetSysColorBrush
LoadStringA
DestroyMenu
SetFocus
SetWindowPos
GetCapture
GetMenuItemCount
SetWindowTextA
GetDlgCtrlID
DestroyWindow
UnhookWindowsHookEx
GrayStringA
DrawTextA
TabbedTextOutA
WinHelpA
GetClassInfoA
RegisterClassA
GetMenu
GetSubMenu
GetMenuItemID
CreateWindowExA
GetClassLongA
SetPropA
GetPropA
ClientToScreen
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessagePos
GetMessageTime
RegisterWindowMessageA
IsIconic
GetWindowPlacement
GetMenuCheckMarkDimensions
LoadBitmapA
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetKeyState
CallNextHookEx
ValidateRect
SetWindowsHookExA
GetLastActivePopup
SetCursor
PostMessageA
PostQuitMessage
GetWindow
IsWindowVisible
GetWindowLongA
GetWindowTextA
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
GetCursorPos
SetWindowLongA
GetDlgItem
ShowWindow
SystemParametersInfoA
GetDC
ReleaseDC
FindWindowA
GetWindowThreadProcessId
GetClassNameA
SendMessageA
GetWindowRect
GetSystemMetrics
SetForegroundWindow
GetActiveWindow
GetForegroundWindow
IsWindowEnabled
GetParent
EnableWindow
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
wsprintfA
MessageBoxA
MsgWaitForMultipleObjects
PtInRect
UnregisterClassA
ole32
CoCreateInstance
CoUninitialize
gdi32
ExtTextOutA
TextOutA
RectVisible
PtVisible
Escape
GetObjectA
GetStockObject
DeleteObject
DeleteDC
SelectObject
GetDeviceCaps
CreateBitmap
SaveDC
RestoreDC
SetBkColor
SetTextColor
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
advapi32
RegCloseKey
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
shell32
SHGetFileInfoA
SHGetSpecialFolderPathA
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
comctl32
ord17
Sections
.text Size: 96KB - Virtual size: 95KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 396KB - Virtual size: 530KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 56KB - Virtual size: 53KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE