??4ShellResourceRequestDetails@@QAEAAU0@ABU0@@Z
Static task
static1
Behavioral task
behavioral1
Sample
bdcd5364a1517e109dd63321dc7808b041b4d249763522a97066d65a39b645cc.exe
Resource
win7-20231215-en
General
-
Target
bdcd5364a1517e109dd63321dc7808b041b4d249763522a97066d65a39b645cc
-
Size
1.9MB
-
MD5
94681a56def06fba5a2a03cad01552dd
-
SHA1
208adb2915351bc64e8deee71da903627711d7c5
-
SHA256
bdcd5364a1517e109dd63321dc7808b041b4d249763522a97066d65a39b645cc
-
SHA512
b61575cf8b9a03384ff8115de4eff790700b4f5a16e4db0f6bb6cffab1239a5b2d6c8e71ad6e06e0a58cc1a53d4e413d4e530201d317c4b2a2c0a66976921854
-
SSDEEP
49152:7jM8L0jhGCVOfg0qFwbsAQaIMuBKbTOYo3lmH7nn:7jM8LCh9uqK4AQUGN3IH7n
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bdcd5364a1517e109dd63321dc7808b041b4d249763522a97066d65a39b645cc
Files
-
bdcd5364a1517e109dd63321dc7808b041b4d249763522a97066d65a39b645cc.exe windows:5 windows x86 arch:x86
1dcc356a3119fd4a9dda251dc559548f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
FormatMessageA
GetSystemTime
GetSystemTimeAsFileTime
SystemTimeToFileTime
GetProcessHeap
GetCurrentProcessId
LockFileEx
LocalFree
CreateFileMappingA
UnlockFile
HeapDestroy
HeapCompact
HeapAlloc
GetSystemInfo
HeapReAlloc
DeleteFileA
GetVersionExA
WaitForSingleObjectEx
LoadLibraryA
FlushViewOfFile
OutputDebugStringW
GetFileAttributesExW
GetFileAttributesA
GetDiskFreeSpaceA
FormatMessageW
GetTempPathA
HeapSize
HeapValidate
GetTempPathW
UnlockFileEx
SetEndOfFile
GetFullPathNameA
LockFile
GetDiskFreeSpaceW
InterlockedCompareExchange
GetFullPathNameW
HeapFree
HeapCreate
AreFileApisANSI
TryEnterCriticalSection
GetPrivateProfileStringW
WritePrivateProfileStringW
CopyFileW
OpenProcess
DebugBreak
lstrlenA
lstrlenW
GetDiskFreeSpaceExW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
OpenMutexW
GetCurrentThread
WaitForMultipleObjects
CreateProcessW
GetPrivateProfileIntW
GetSystemDirectoryW
GetTempFileNameW
QueryDosDeviceW
GetFileType
DuplicateHandle
DosDateTimeToFileTime
GetCurrentDirectoryW
GetExitCodeProcess
ReleaseMutex
GetSystemTimes
LockResource
VirtualQuery
SetUnhandledExceptionFilter
GetCommandLineW
WritePrivateProfileStructW
DeviceIoControl
ResetEvent
TlsAlloc
TlsSetValue
TlsFree
CreateWaitableTimerW
SetWaitableTimer
CancelWaitableTimer
IsBadReadPtr
IsBadWritePtr
FindResourceW
lstrcpynW
TerminateThread
SuspendThread
lstrcmpA
lstrcmpiA
GetFileSizeEx
ExitProcess
OutputDebugStringA
GetModuleHandleW
LoadLibraryExW
lstrcmpiW
FlushFileBuffers
LoadResource
Sleep
SetErrorMode
TerminateProcess
GetCurrentProcess
InterlockedDecrement
InterlockedIncrement
GetTickCount
FindNextFileW
FindFirstFileW
RemoveDirectoryW
FindClose
FreeLibrary
InitializeCriticalSection
ExitThread
MoveFileExW
SetFileAttributesW
GetModuleFileNameW
LoadLibraryW
CreateThread
GetProcAddress
CreateMutexW
LeaveCriticalSection
EnterCriticalSection
GetCurrentThreadId
CreateEventW
WaitForSingleObject
SetEvent
WideCharToMultiByte
MultiByteToWideChar
WriteConsoleW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
IsValidCodePage
FindNextFileA
FindFirstFileExA
SetStdHandle
GetTimeZoneInformation
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetTimeFormatW
GetDateFormatW
GetConsoleCP
ReadConsoleW
GetConsoleMode
GetModuleFileNameA
FileTimeToSystemTime
SystemTimeToTzSpecificLocalTime
GetDriveTypeW
GetModuleHandleExW
FreeLibraryAndExitThread
ResumeThread
RtlUnwind
OpenThread
HeapWalk
HeapUnlock
HeapLock
SetFilePointerEx
LocalFileTimeToFileTime
FlushInstructionCache
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
GetStartupInfoW
IsDebuggerPresent
IsProcessorFeaturePresent
UnhandledExceptionFilter
GetCPInfo
GetLocaleInfoW
LCMapStringW
CompareStringW
DeleteFileW
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
RaiseException
DecodePointer
GetFileAttributesW
GetStringTypeW
TlsGetValue
SwitchToThread
EncodePointer
LoadLibraryExA
VirtualProtect
VerifyVersionInfoA
VerSetConditionMask
PeekNamedPipe
GetStdHandle
GetEnvironmentVariableA
MoveFileExA
GetSystemDirectoryA
QueryPerformanceFrequency
SleepEx
GetLongPathNameW
GetACP
QueryPerformanceCounter
IsProcessInJob
SizeofResource
QueryInformationJobObject
CreateDirectoryW
SetFileTime
SetLastError
GetVersionExW
VirtualFree
VirtualAlloc
CreateFileA
SetFilePointer
ReadFile
WriteFile
GetFileSize
GetLastError
CreateFileW
CreateFileMappingW
UnmapViewOfFile
MapViewOfFile
CloseHandle
GetModuleHandleA
user32
GetForegroundWindow
DispatchMessageW
TranslateMessage
GetMonitorInfoW
MonitorFromWindow
LoadCursorW
SetWindowLongW
GetWindowLongW
GetWindowRect
UnregisterClassW
GetMessageW
PostThreadMessageW
GetMessagePos
SetWindowTextW
KillTimer
SetTimer
GetAsyncKeyState
GetKeyState
SetWindowPos
ShowWindow
IsWindow
CreateWindowExW
GetClassInfoExW
RegisterClassExW
CallWindowProcW
PostQuitMessage
DefWindowProcW
SendMessageW
GetShellWindow
MsgWaitForMultipleObjects
CloseWindow
RealGetWindowClassW
SystemParametersInfoW
GetWindowThreadProcessId
WindowFromPoint
GetLastInputInfo
SendMessageTimeoutW
wsprintfW
EnumDisplayDevicesW
EnumDisplaySettingsW
CharLowerW
EnumDisplayMonitors
GetWindowTextW
wvsprintfW
CallNextHookEx
UnhookWindowsHookEx
SetWindowsHookExW
FindWindowExW
FindWindowW
GetDesktopWindow
SetForegroundWindow
CharNextW
PeekMessageW
ReleaseDC
GetDC
GetSystemMetrics
DestroyWindow
GetClassNameW
PostMessageW
gdi32
GetDeviceCaps
shell32
ord680
SHFileOperationW
SHGetFolderPathW
ShellExecuteExW
ShellExecuteW
SHAppBarMessage
SHGetSpecialFolderPathW
ord165
ws2_32
getpeername
getsockname
getsockopt
ntohs
setsockopt
WSASetLastError
WSAIoctl
WSACleanup
__WSAFDIsSet
select
getaddrinfo
freeaddrinfo
bind
WSAGetLastError
WSAWaitForMultipleEvents
WSAResetEvent
WSAEventSelect
WSAEnumNetworkEvents
WSACreateEvent
WSACloseEvent
WSAStartup
socket
send
recv
listen
htonl
closesocket
accept
connect
gethostname
ioctlsocket
sendto
recvfrom
htons
wldap32
ord32
ord211
ord60
ord27
ord26
ord22
ord41
ord50
ord45
ord35
ord46
ord217
ord33
ord79
ord30
ord200
ord301
ord143
crypt32
CertEnumCertificatesInStore
CertFindCertificateInStore
CertFreeCertificateContext
CryptStringToBinaryA
PFXImportCertStore
CryptDecodeObjectEx
CertCloseStore
CertFindExtension
CertGetNameStringA
CryptQueryObject
CertCreateCertificateChainEngine
CertFreeCertificateChainEngine
CertGetCertificateChain
CertFreeCertificateChain
CertOpenStore
CertAddCertificateContextToStore
shlwapi
PathFindExtensionW
SHGetValueA
PathGetDriveNumberW
PathAddBackslashW
StrDupW
StrStrIW
PathFindFileNameA
StrStrIA
SHDeleteValueW
PathFindFileNameW
StrCmpIW
PathFileExistsW
PathRemoveFileSpecW
PathCombineW
SHGetValueW
SHSetValueW
PathAppendW
PathIsRootW
psapi
GetProcessImageFileNameW
GetModuleFileNameExW
version
GetFileVersionInfoW
VerQueryValueW
GetFileVersionInfoSizeW
wtsapi32
WTSQuerySessionInformationW
WTSFreeMemory
setupapi
SetupIterateCabinetW
netapi32
NetUserChangePassword
Netbios
Exports
Exports
Sections
.text Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 299KB - Virtual size: 298KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 41KB - Virtual size: 144KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 241KB - Virtual size: 244KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE