Static task
static1
Behavioral task
behavioral1
Sample
bcdboot.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
bcdboot.exe
Resource
win10v2004-20230703-en
General
-
Target
bcdboot.exe
-
Size
236KB
-
MD5
6ecbb7e78f52877f39eb2ad9adab5ce9
-
SHA1
4d04271bd419cef7d219c702a779bb85bc01334e
-
SHA256
d8f1c8a9d019a9430366322d78d76d5647e30664e2d96b3a5fb87738d603d19b
-
SHA512
d247606d7cad16c7dc5927f8aea64cd3c2e80dbe80183685f7721f105d447816cf1ddef126a9c13be5305e3e028d09a76ab78e4cd209b619baf5488524b18988
-
SSDEEP
3072:/82iEYVE+5UdD2To8pN8mNlxYPcKrg2aP6nONeeR++2LKn2ONUml:biZVNUdDa7N8yjKrg5PeKWjKUm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bcdboot.exe
Files
-
bcdboot.exe.exe windows x64
f4bbb8fabfb86f652548e2b91df66b99
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_GUARD_CF
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
msvcrt
?terminate@@YAXXZ
_commode
_fmode
__C_specific_handler
__setusermatherr
_cexit
_exit
exit
_wcsicmp
__set_app_type
memmove
memcpy
memcmp
__iob_func
__wgetmainargs
_amsg_exit
_XcptFilter
_wsetlocale
wcscpy_s
swprintf_s
_initterm
bsearch
wcsncmp
strncmp
wcsncpy_s
wcsnlen
wcsstr
_wcslwr
_snwscanf_s
wcstoul
_ultow_s
wcschr
fwprintf
_vsnwprintf_s
fclose
_wfopen_s
fflush
wcscat_s
_wcsnicmp
_wcsupr
wcsrchr
_vsnwprintf
memset
rpcrt4
UuidCreate
imagehlp
CheckSumMappedFile
kernel32
WriteConsoleW
GetProcAddress
GetProcessHeap
FreeLibrary
WideCharToMultiByte
GetFileType
Sleep
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetModuleHandleW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
GetTickCount
QueryDosDeviceW
GetFileSizeEx
DeviceIoControl
GetVolumePathNameW
CreateFileW
UnmapViewOfFile
GetVolumeNameForVolumeMountPointW
LoadLibraryW
CloseHandle
CreateFileMappingW
MapViewOfFile
FlushFileBuffers
WriteFile
FindFirstFileW
FindNextFileW
GetPrivateProfileSectionW
FindClose
GetFileAttributesW
SetFileAttributesW
LocalFree
MoveFileExW
GetStdHandle
GetLogicalDrives
FindFirstVolumeW
SetVolumeMountPointW
FindVolumeClose
DeleteVolumeMountPointW
FindNextVolumeW
LoadLibraryExW
GetModuleHandleExW
GetConsoleOutputCP
HeapFree
GetLastError
CreateDirectoryW
SetLastError
HeapAlloc
FormatMessageW
GetConsoleMode
GetCurrentThread
GetModuleFileNameW
LoadResource
FindResourceExW
GetVersionExW
LocalAlloc
GetUserDefaultUILanguage
CloseThreadpool
CreateThreadpool
SetThreadpoolThreadMinimum
SetThreadpoolThreadMaximum
GetFullPathNameW
GetFileInformationByHandle
CopyFileExW
GetSystemDefaultUILanguage
GetLocaleInfoW
GetVolumeInformationW
SearchPathW
shlwapi
PathRemoveBackslashW
advapi32
LookupPrivilegeValueW
GetSecurityDescriptorSacl
AdjustTokenPrivileges
GetSecurityDescriptorDacl
GetSecurityDescriptorGroup
RegCloseKey
RegOpenKeyExW
RegQueryValueExW
SetNamedSecurityInfoW
GetSecurityDescriptorControl
GetSecurityDescriptorOwner
OpenProcessToken
ConvertSidToStringSidW
ConvertStringSecurityDescriptorToSecurityDescriptorW
OpenThreadToken
GetTokenInformation
EventWriteTransfer
EventRegister
EventUnregister
ntdll
ZwQueryAttributesFile
ZwOpenFile
ZwClose
ZwWaitForSingleObject
ZwQueryKey
ZwReleaseMutant
ZwOpenMutant
RtlLengthSecurityDescriptor
RtlSetOwnerSecurityDescriptor
NtOpenSymbolicLinkObject
RtlSetDaclSecurityDescriptor
NtOpenKey
NtQuerySymbolicLinkObject
RtlAddAccessAllowedAceEx
RtlAllocateAndInitializeSid
RtlLengthSid
RtlFreeSid
RtlCreateAcl
RtlCreateSecurityDescriptor
NtQueryValueKey
NtQueryBootEntryOrder
NtQueryBootOptions
NtTranslateFilePath
NtOpenDirectoryObject
NtQueryDirectoryObject
NtEnumerateBootEntries
RtlAppendUnicodeToString
ZwCreateFile
ZwCreateKey
ZwLoadKey
ZwFlushKey
ZwDeleteValueKey
ZwSaveKey
ZwDeleteKey
ZwEnumerateKey
ZwQueryValueKey
ZwSetSecurityObject
ZwUnloadKey
ZwSetValueKey
ZwOpenKey
ZwAllocateUuids
ZwQuerySymbolicLinkObject
ZwDeviceIoControlFile
ZwOpenSymbolicLinkObject
LdrGetProcedureAddress
LdrGetDllHandle
ZwQueryInformationProcess
RtlInitAnsiString
ZwQueryInformationFile
ZwOpenProcess
NtAdjustPrivilegesToken
NtOpenProcessTokenEx
NtOpenThreadTokenEx
RtlImpersonateSelf
NtSetInformationFile
RtlFreeHeap
RtlAllocateHeap
LdrAccessResource
LdrFindResource_U
RtlCompareMemory
RtlStringFromGUID
RtlFreeUnicodeString
NtQuerySystemInformation
NtOpenFile
NtWaitForSingleObject
RtlNtStatusToDosError
NtQueryInformationThread
NtQueryInformationFile
NtCreateEvent
NtClose
RtlImageNtHeader
NtDeviceIoControlFile
NtSetInformationThread
NtReadFile
NtOpenProcess
NtQueryInformationProcess
NtWriteFile
RtlInitUnicodeString
RtlGUIDFromString
ZwQuerySystemInformation
Sections
.text Size: 136KB - Virtual size: 135KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 81KB - Virtual size: 81KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ