Static task
static1
Behavioral task
behavioral1
Sample
bit_che_install.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
bit_che_install.exe
Resource
win10v2004-20221111-en
General
-
Target
9d28f2b2cee98295c9164a009ad030bd1bd75e88aa2abd46ab0a0dd6b0731ff7
-
Size
410KB
-
MD5
66d12273af945655807b92abf26a55b5
-
SHA1
789898c0e7aed7982d4d3d34462aa67b561f96db
-
SHA256
9d28f2b2cee98295c9164a009ad030bd1bd75e88aa2abd46ab0a0dd6b0731ff7
-
SHA512
13e2e288f70d0aaa4cb056472592052f6979a3ab885e22544e0d18c62e2e69ac469f5447a0671d4719a14dc429fc935bd51abcbc5f43fa62fa9510dbeec80ad7
-
SSDEEP
12288:aisBCWXPR17nZvwXCFZL67xeIikWm23yw73Yw7JprySjZ:ebnZOiZWlEzH73Yir5t
Malware Config
Signatures
Files
-
9d28f2b2cee98295c9164a009ad030bd1bd75e88aa2abd46ab0a0dd6b0731ff7.zip
-
bit_che_install.exe.exe windows x86
1f637da02688b42cd657717180ae6f8f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
GetProcAddress
GetModuleHandleW
CreateFileW
GetDriveTypeA
advapi32
RegQueryValueExA
RegOpenKeyA
Sections
.text Size: 772KB - Virtual size: 771KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 564B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.t221 Size: 1024B - Virtual size: 555B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.t22 Size: 1024B - Virtual size: 555B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.t21 Size: 1024B - Virtual size: 555B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.t2 Size: 1024B - Virtual size: 555B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdat Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ