Static task
static1
Behavioral task
behavioral1
Sample
SecuriteInfo.com.BScope.Trojan.Packed.27805.16163.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
SecuriteInfo.com.BScope.Trojan.Packed.27805.16163.exe
Resource
win10v2004-20230915-en
General
-
Target
SecuriteInfo.com.BScope.Trojan.Packed.27805.16163.exe
-
Size
374KB
-
MD5
f68e2faada5c7a227a068e5343414c7e
-
SHA1
fda1d52c19cee5c9cfc8fd31259fb1385d7e263b
-
SHA256
5f86236e9f7efe3a473cb398d1a5534ac6c261025420947c6b0e397ca50e8a68
-
SHA512
36931e7002441aecd35ec10eb9ec2e52e2a307d4815149b6ecef823dd62a5e4bc66e4eb1ad9eda0b719292fb9211726ef15a4090c680aa512a6b4ff9b68714a9
-
SSDEEP
3072:a0ZkwT3AaXL5MUDhK3qDhxqzDRaWOZaNmnz9lp4jHt2oJXr:dZz/MUtK3qDHqHD+UQzrCkE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource SecuriteInfo.com.BScope.Trojan.Packed.27805.16163.exe
Files
-
SecuriteInfo.com.BScope.Trojan.Packed.27805.16163.exe.exe windows:4 windows x86
6ff99c511427371177c208f27898be70
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DuplicateHandle
GetVolumeInformationA
GetFullPathNameA
FileTimeToLocalFileTime
GetFileTime
GlobalFlags
GetLocaleInfoA
GetCPInfo
GetOEMCP
RtlUnwind
GetTimeFormatA
GetDateFormatA
HeapAlloc
HeapFree
HeapReAlloc
VirtualAlloc
GetProcessHeap
RaiseException
SetStdHandle
GetFileType
HeapSize
ExitProcess
UnlockFile
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetACP
LCMapStringA
LCMapStringW
Sleep
GetConsoleCP
GetConsoleMode
SetHandleCount
GetStdHandle
GetStartupInfoA
GetStringTypeA
GetStringTypeW
GetTimeZoneInformation
VirtualFree
HeapDestroy
HeapCreate
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
LockFile
FlushFileBuffers
WriteFile
ReadFile
GetCurrentThreadId
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcmpW
InterlockedIncrement
TlsFree
DeleteCriticalSection
LocalReAlloc
TlsSetValue
TlsAlloc
InitializeCriticalSection
GlobalHandle
GlobalReAlloc
EnterCriticalSection
TlsGetValue
LeaveCriticalSection
LocalAlloc
GetCurrentProcessId
InterlockedDecrement
GetModuleFileNameW
FileTimeToSystemTime
GetThreadLocale
lstrcmpA
GlobalGetAtomNameA
SetErrorMode
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
MoveFileExA
GetShortPathNameA
CreateFileA
GetFileSize
CreateFileMappingA
MapViewOfFile
UnmapViewOfFile
SetFilePointer
SetEndOfFile
GetSystemDirectoryA
GetCurrentProcess
CloseHandle
GetVersionExA
lstrlenA
CompareStringW
CompareStringA
GetVersion
InterlockedExchange
GetLocalTime
FindFirstFileA
FindNextFileA
FindClose
SetLastError
GetWindowsDirectoryA
GetFileAttributesA
SetFileAttributesA
DeleteFileA
RemoveDirectoryA
CopyFileA
MoveFileA
FormatMessageA
LocalFree
WideCharToMultiByte
GetLastError
GetCommandLineA
GetModuleHandleA
GetModuleFileNameA
LoadLibraryA
GetProcAddress
MultiByteToWideChar
FindResourceA
LoadResource
LockResource
SizeofResource
TerminateProcess
FreeLibrary
user32
SetWindowTextA
ValidateRect
RegisterWindowMessageA
LoadIconA
WinHelpA
GetCapture
SetWindowsHookExA
CallNextHookEx
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
GetFocus
IsWindow
GetForegroundWindow
DispatchMessageA
GetDlgItem
GetTopWindow
DestroyWindow
GetMessageTime
GetMessagePos
PeekMessageA
MapWindowPoints
GetKeyState
SetForegroundWindow
GetClientRect
PostMessageA
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
AdjustWindowRectEx
CopyRect
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
SetWindowPos
SystemParametersInfoA
IsIconic
GetWindowPlacement
GetWindowRect
GetWindow
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
UnregisterClassA
CheckMenuItem
EnableMenuItem
ModifyMenuA
LoadBitmapA
GetMenuCheckMarkDimensions
SetMenuItemBitmaps
DestroyMenu
PostQuitMessage
LoadCursorA
GetSystemMetrics
GetDC
ReleaseDC
GetSysColor
GetSysColorBrush
GetWindowThreadProcessId
SendMessageA
GetParent
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
EnableWindow
MessageBoxA
UnhookWindowsHookEx
GetWindowTextA
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
ExitWindowsEx
CharUpperA
CharToOemBuffA
GetMenu
gdi32
DeleteDC
CreateBitmap
GetStockObject
PtVisible
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
ExtTextOutA
TextOutA
GetDeviceCaps
DeleteObject
GetClipBox
SetMapMode
SetTextColor
SetBkColor
RestoreDC
SaveDC
RectVisible
comdlg32
GetFileTitleA
winspool.drv
ClosePrinter
DocumentPropertiesA
OpenPrinterA
advapi32
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegSetValueExA
RegDeleteValueA
shell32
SHGetPathFromIDListA
SHGetMalloc
SHGetDesktopFolder
SHGetSpecialFolderLocation
shlwapi
PathFileExistsA
PathIsDirectoryA
PathStripPathA
PathAppendA
PathFindFileNameA
PathRenameExtensionA
PathFindExtensionA
PathRemoveFileSpecA
StrStrIA
PathStripToRootA
PathIsUNCA
PathIsSameRootA
oleaut32
VariantInit
VariantClear
VariantChangeType
version
GetFileVersionInfoA
VerQueryValueA
GetFileVersionInfoSizeA
Sections
.text Size: 148KB - Virtual size: 145KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 32KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ