Static task
static1
Behavioral task
behavioral1
Sample
BurnerMax.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
BurnerMax.exe
Resource
win10v2004-20230703-en
General
-
Target
BurnerMax.exe
-
Size
768KB
-
MD5
9d92961c39c2e630a7e43bed7ac6c9a4
-
SHA1
19504e0fec8642d48973bf57725606e02735496b
-
SHA256
e5611ba8f7a9ed92bfd988ad4fa7b4300df1968f18e9957f0d17e14ef357d417
-
SHA512
4441385c148fa80df7644d6f4c5db35cbd5ab2fc2bae576a7d97b9fbb320629e90633cde03ed94dfa9c72ee7a32ae2d83cc27edbac313610ecc49b1cd29e657c
-
SSDEEP
12288:klgUTaiGY4c+QUsIwaXIf2t45iT89m3gRark1evjH4pe7A9iv0hmDIVK38ZuLQty:dUTaid4cvaXIf2t45iT89m3gRark1evh
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource BurnerMax.exe
Files
-
BurnerMax.exe.exe windows x86
Password: asdasd
3f2b99334bb671a53c843c1d4abad4b0
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetStartupInfoA
GetCommandLineA
GetVersionExA
DebugBreak
GetStdHandle
WriteFile
InterlockedDecrement
LoadLibraryA
InterlockedIncrement
GetModuleFileNameA
ExitProcess
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
GetLastError
GetEnvironmentStringsW
SetHandleCount
GetFileType
DeleteCriticalSection
TlsAlloc
GetCurrentThreadId
TlsFree
TlsSetValue
TlsGetValue
SetLastError
GetCurrentThread
HeapDestroy
HeapCreate
HeapFree
VirtualFree
RtlUnwind
EnterCriticalSection
LeaveCriticalSection
FatalAppExitA
IsBadWritePtr
IsBadReadPtr
HeapValidate
GetModuleHandleA
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetACP
GetOEMCP
GetCPInfo
InitializeCriticalSection
HeapAlloc
VirtualAlloc
HeapReAlloc
VirtualQuery
InterlockedExchange
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetTimeFormatA
GetDateFormatA
IsValidLocale
IsValidCodePage
GetLocaleInfoA
EnumSystemLocalesA
GetUserDefaultLCID
SetFilePointer
VirtualProtect
GetSystemInfo
GetTimeZoneInformation
SetStdHandle
GetLocaleInfoW
FlushFileBuffers
CloseHandle
CompareStringA
CompareStringW
SetEnvironmentVariableA
SetEndOfFile
GetProcAddress
DeviceIoControl
CreateFileA
GetDriveTypeA
GetLogicalDrives
SetConsoleCtrlHandler
OutputDebugStringA
ReadFile
mscoree
_CorExeMain
user32
GetDesktopWindow
GetWindowRect
FindWindowA
GetWindowLongA
SetWindowsHookExA
FindWindowExA
SendMessageA
ShowWindow
UnhookWindowsHookEx
CallNextHookEx
MoveWindow
gdi32
GetDeviceCaps
CreateDCA
Sections
.text Size: 124KB - Virtual size: 123KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 532KB - Virtual size: 530KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 84KB - Virtual size: 83KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.odata Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ