Static task
static1
Behavioral task
behavioral1
Sample
bc32166b39aa110af886260bca122438c3aa31b006f45c28f8afc8a5d578e898.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
bc32166b39aa110af886260bca122438c3aa31b006f45c28f8afc8a5d578e898.exe
Resource
win10v2004-20231020-en
General
-
Target
bc32166b39aa110af886260bca122438c3aa31b006f45c28f8afc8a5d578e898
-
Size
765KB
-
MD5
b0e76c79a86206caa7d8c400c8f17619
-
SHA1
b82b64a2e047e2c564272f3f1bbd8f9db1020896
-
SHA256
bc32166b39aa110af886260bca122438c3aa31b006f45c28f8afc8a5d578e898
-
SHA512
956f7310d4a65a83bcbf37ea4a8b3b30b58ef7cbaf95e106affb7e146ca2c465d8bbbbb1ce11f1a8df21871eaea627d60e36771cbb38987a68e912237846dfe3
-
SSDEEP
12288:H+KJ485Rg+Kf2VkCXA7JJ8tLCqffyhMD9WPSHArCzrEJgHZOyxJX3vUzZs50cXPH:isb3vUd+0lRgPG8i39qUFXhu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bc32166b39aa110af886260bca122438c3aa31b006f45c28f8afc8a5d578e898
Files
-
bc32166b39aa110af886260bca122438c3aa31b006f45c28f8afc8a5d578e898.exe windows:5 windows x86
7cb300e0af3f9134d947395bbeeb74b4
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
InterlockedCompareExchange
Sleep
OpenMutexW
WaitForSingleObject
MapViewOfFile
CreateFileMappingW
SetEvent
GetLastError
CreateEventW
UnmapViewOfFile
OpenEventW
VirtualQuery
GetCurrentProcessId
GetLocalTime
CloseHandle
GetCurrentThreadId
InterlockedExchange
CreateFileW
EncodePointer
DecodePointer
RaiseException
IsProcessorFeaturePresent
QueueUserWorkItem
GetModuleHandleExW
FormatMessageW
WideCharToMultiByte
EnterCriticalSection
LeaveCriticalSection
TryEnterCriticalSection
DeleteCriticalSection
SetLastError
InitializeCriticalSectionAndSpinCount
SwitchToThread
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
GetModuleHandleW
GetProcAddress
DuplicateHandle
WaitForSingleObjectEx
GetCurrentProcess
GetCurrentThread
QueryPerformanceCounter
FindFirstFileW
GetLongPathNameW
GetFileAttributesExW
QueryDosDeviceW
SearchPathW
ExpandEnvironmentStringsW
GetEnvironmentVariableW
LocalFree
ResetEvent
GetACP
MultiByteToWideChar
CreateMutexW
ReleaseMutex
InitializeCriticalSection
GetVersionExW
LockResource
LoadResource
FindResourceW
lstrcmpiW
TerminateProcess
FindNextFileW
FindClose
ReadFile
GetFileSize
CreateDirectoryW
GetFullPathNameW
lstrlenW
SetFilePointer
GetTempPathW
GetFileAttributesW
SetFileAttributesW
DeleteFileW
GetWindowsDirectoryW
GetTempFileNameW
HeapFree
HeapAlloc
GetProcessHeap
GetLogicalDriveStringsW
LoadLibraryW
FreeLibrary
LoadLibraryExW
InterlockedExchangeAdd
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetStartupInfoW
InitializeSListHead
UnregisterWait
UnregisterWaitEx
ReadProcessMemory
GetProcessTimes
RegisterWaitForSingleObject
CreateNamedPipeW
DisconnectNamedPipe
GetOverlappedResult
ConnectNamedPipe
CreateTimerQueue
SignalObjectAndWait
CreateThread
SetThreadPriority
GetThreadPriority
GetLogicalProcessorInformation
CreateTimerQueueTimer
ChangeTimerQueueTimer
DeleteTimerQueueTimer
GetNumaHighestNodeNumber
GetProcessAffinityMask
SetThreadAffinityMask
GetThreadTimes
FreeLibraryAndExitThread
GetModuleHandleA
VirtualAlloc
VirtualProtect
VirtualFree
ReleaseSemaphore
InterlockedPopEntrySList
InterlockedPushEntrySList
InterlockedFlushSList
QueryDepthSList
RtlUnwind
ExitProcess
GetStdHandle
GetStringTypeW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
GetFileType
FlushFileBuffers
GetConsoleCP
GetConsoleMode
SetFilePointerEx
FindFirstFileExW
IsValidCodePage
GetOEMCP
GetCPInfo
GetCommandLineA
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetStdHandle
WriteConsoleW
HeapSize
HeapReAlloc
Thread32Next
Thread32First
SuspendThread
CreateToolhelp32Snapshot
OpenThread
GetModuleFileNameW
WriteFile
GetTickCount
WaitForMultipleObjects
GlobalMemoryStatusEx
RemoveDirectoryW
OpenProcess
user32
GetWindowThreadProcessId
FindWindowExW
IsIconic
ShowWindow
SendMessageW
IsWindowVisible
IsWindow
SetForegroundWindow
advapi32
RegisterServiceCtrlHandlerExW
SetServiceStatus
StartServiceCtrlDispatcherW
psapi
GetProcessMemoryInfo
Sections
.text Size: 447KB - Virtual size: 447KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 128KB - Virtual size: 128KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 12KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 129KB - Virtual size: 128KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 26KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ