Static task
static1
Behavioral task
behavioral1
Sample
bd02b20d49f8dbfd006cb6d72dd932d4601d3b011dcab971c1b56e59344178b3.exe
Resource
win10v2004-20230703-en
General
-
Target
bd02b20d49f8dbfd006cb6d72dd932d4601d3b011dcab971c1b56e59344178b3
-
Size
288KB
-
MD5
03ecea81233402ec522db80be7d4f139
-
SHA1
d2ad325d227114748697512a4de8a5d251dc98da
-
SHA256
bd02b20d49f8dbfd006cb6d72dd932d4601d3b011dcab971c1b56e59344178b3
-
SHA512
3a04b8d963a38aa21d668e27f67ec9c925bb701c643ed140625f90bde5d5c81eecc762fd10769bcee6fe4224a6a51c5283be89e8ed9b3438525a804450138ea7
-
SSDEEP
3072:lnP/azoADzDgixPLOceLIO/YVRtLmD3naaORWXGh/H/DpCCfxfJY09oLV1XyuEP8:lXQhwi1LjTXZeKaOBZ1CC5V9WCuEPw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bd02b20d49f8dbfd006cb6d72dd932d4601d3b011dcab971c1b56e59344178b3
Files
-
bd02b20d49f8dbfd006cb6d72dd932d4601d3b011dcab971c1b56e59344178b3.exe windows x86
f2d4adc959fb5a4f1a3790b0fe927782
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FillConsoleOutputCharacterA
SearchPathW
FindResourceA
lstrlenA
WritePrivateProfileStructA
GetConsoleAliasesLengthW
PeekNamedPipe
TlsGetValue
AllocConsole
FindResourceW
HeapAlloc
_lwrite
InterlockedDecrement
InterlockedCompareExchange
GetTickCount
FormatMessageA
GetCompressedFileSizeW
GlobalAlloc
GetLocaleInfoW
WriteConsoleOutputA
TransactNamedPipe
CreateActCtxA
DisconnectNamedPipe
GetConsoleAliasesW
GetProfileIntA
GetDateFormatW
GetLastError
lstrcmpiA
GetProcAddress
AttachConsole
VirtualAlloc
CreateMemoryResourceNotification
SetFileApisToOEM
LoadLibraryA
InterlockedExchangeAdd
DeleteTimerQueue
FindNextChangeNotification
Module32FirstW
EnumResourceTypesW
GetThreadPriority
GetCommTimeouts
UpdateResourceW
GetStringTypeW
OpenSemaphoreW
ReadConsoleInputW
GetWindowsDirectoryW
GetCurrentProcessId
AddConsoleAliasA
ResetWriteWatch
CreateFileA
SetStdHandle
WriteConsoleW
OpenMutexW
GetComputerNameA
InterlockedIncrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetStartupInfoW
RtlUnwind
RaiseException
LCMapStringA
WideCharToMultiByte
MultiByteToWideChar
LCMapStringW
GetCPInfo
HeapCreate
VirtualFree
HeapReAlloc
GetModuleHandleW
TlsAlloc
TlsSetValue
TlsFree
SetLastError
GetCurrentThreadId
HeapSize
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
SetHandleCount
GetFileType
GetStartupInfoA
QueryPerformanceCounter
GetSystemTimeAsFileTime
GetACP
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
GetStringTypeA
InitializeCriticalSectionAndSpinCount
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetFilePointer
CloseHandle
WriteConsoleA
GetConsoleOutputCP
user32
CharUpperBuffA
LoadMenuW
CharLowerBuffA
CharToOemBuffA
advapi32
InitiateSystemShutdownA
Sections
.text Size: 176KB - Virtual size: 175KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 31.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 62KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 42KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ