Static task
static1
Behavioral task
behavioral1
Sample
bff6acb80873d7061cb731e27ae8a7d857ae7cdefa8fa9cedddbf90469d0905b.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
bff6acb80873d7061cb731e27ae8a7d857ae7cdefa8fa9cedddbf90469d0905b.exe
Resource
win10v2004-20230915-en
General
-
Target
bff6acb80873d7061cb731e27ae8a7d857ae7cdefa8fa9cedddbf90469d0905b
-
Size
196KB
-
MD5
b06976649cb31fc2e25fce8d2c554c19
-
SHA1
f73606e2b488deeaef8aafa6b3b0a0bef4a6d0e7
-
SHA256
bff6acb80873d7061cb731e27ae8a7d857ae7cdefa8fa9cedddbf90469d0905b
-
SHA512
21ba86c1a0d5ba62ca1b82230b439c254cf9b1e64ba65c48bcf3d656374836765c7a4c4c3cc4d0679a6a528d990b32a7b6a31a3e3618c523e270fc5dbaf307ad
-
SSDEEP
3072:ROhfV2TwMRd1CaH0Ewm0ZDsBiPXhoHp0Yzq/NR2D1B1lKKXGu8w:RcfVAwfLGiPXhoJt2/NRo1BW2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bff6acb80873d7061cb731e27ae8a7d857ae7cdefa8fa9cedddbf90469d0905b
Files
-
bff6acb80873d7061cb731e27ae8a7d857ae7cdefa8fa9cedddbf90469d0905b.exe windows:4 windows x86
cf40fab5a2f65e08d364b7e6834e4a15
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeleteFileA
GetDriveTypeW
GetDriveTypeA
GetFileSize
WaitForSingleObject
DeleteFileW
DeviceIoControl
IsBadWritePtr
ResetEvent
CreateEventA
QueryDosDeviceA
SetEndOfFile
CreateDirectoryA
GetTempFileNameA
CreateDirectoryW
GetTempFileNameW
CreateFileA
CreateFileW
WriteFile
GetVersionExA
EnterCriticalSection
LeaveCriticalSection
GetCurrentProcess
lstrcatA
lstrcpyA
LoadLibraryA
GetProcAddress
FreeLibrary
GetModuleHandleA
GetStartupInfoA
GetShortPathNameA
MultiByteToWideChar
lstrlenA
InterlockedIncrement
lstrlenW
DeleteCriticalSection
InitializeCriticalSection
GetModuleFileNameA
GetCommandLineA
lstrcmpiA
GetCurrentThreadId
GetCurrentThread
InterlockedDecrement
CloseHandle
CreateMutexA
ReadFile
SetFilePointer
WideCharToMultiByte
GetLastError
user32
CharNextA
GetMessageA
wsprintfA
DispatchMessageA
PostThreadMessageA
MessageBoxA
LoadStringA
msvcrt
__set_app_type
_controlfp
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
_onexit
__dllonexit
?terminate@@YAXXZ
_except_handler3
_stati64
_wstati64
wcslen
_splitpath
_makepath
_wmakepath
_wsplitpath
swprintf
wcschr
wcscpy
wcscat
malloc
free
vsprintf
puts
fopen
vfprintf
fclose
__CxxFrameHandler
_purecall
??3@YAXPAX@Z
??2@YAPAXI@Z
strncpy
strncmp
strtok
toupper
_wcslwr
_wcsicmp
advapi32
RegOpenKeyExW
RegCloseKey
RegQueryValueExA
RegEnumKeyExW
RegEnumKeyExA
RegQueryValueExW
RegSetValueExW
RegSetValueExA
RegCreateKeyExW
RegCreateKeyExA
RegDeleteKeyW
RegDeleteKeyA
RegDeleteValueA
CloseServiceHandle
OpenServiceA
OpenSCManagerA
DeregisterEventSource
ReportEventA
RegisterEventSourceA
RegisterServiceCtrlHandlerA
SetServiceStatus
OpenThreadToken
CreateServiceA
DeleteService
ControlService
StartServiceCtrlDispatcherA
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
CopySid
GetLengthSid
SetSecurityDescriptorOwner
SetSecurityDescriptorGroup
GetTokenInformation
OpenProcessToken
RegOpenKeyExA
shell32
SHGetSpecialFolderPathW
SHGetSpecialFolderPathA
ole32
CoInitializeSecurity
CoDisconnectObject
CoRegisterClassObject
CoRevokeClassObject
CoUninitialize
CoInitialize
CoCreateInstance
oleaut32
LoadRegTypeLi
SysFreeString
SysAllocString
LoadTypeLi
RegisterTypeLi
SysStringLen
shlwapi
PathFileExistsA
PathFileExistsW
winmm
timeGetTime
Sections
.text Size: 120KB - Virtual size: 118KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE