Static task
static1
Behavioral task
behavioral1
Sample
BFV.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
BFV.exe
Resource
win10v2004-20231215-en
General
-
Target
ca86499f2da156f7282a2ef2eb59bda1c382e335934da3c975c5210700984abb
-
Size
11.5MB
-
MD5
7b17692b4243bd499379d0439bca05da
-
SHA1
86b39afe81b019bf8efe3a04827b8cdae8f70f66
-
SHA256
ca86499f2da156f7282a2ef2eb59bda1c382e335934da3c975c5210700984abb
-
SHA512
c7e975fe65180d5cc9c7e550a93200fd1c0c476305ed76ef4a75158b1040841165ec7303be6aa20836fcf1379f6fcc096b9018277cf90c6544bcbdb98317e206
-
SSDEEP
196608:aH/yy3pjhj62V/ebbkTVAUFgEnkJ4eUT4Rww5mIaPSS5SWWRIaJ0OjbscoW20vVo:aH6y3pjhj6jbkJLS8+4eUQd5PRS5YDD8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/BFV.exe
Files
-
ca86499f2da156f7282a2ef2eb59bda1c382e335934da3c975c5210700984abb.zip
-
BFV.exe.exe windows:4 windows x86 arch:x86
05f94bb018fb075ae7014f00b84d8be4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
MulDiv
InterlockedIncrement
InterlockedDecrement
GetSystemInfo
IsProcessorFeaturePresent
lstrcmpiA
GetCurrentThreadId
GetCurrentThread
lstrcmpA
GlobalDeleteAtom
InitializeCriticalSection
FlushFileBuffers
LocalAlloc
TlsAlloc
GlobalHandle
TlsFree
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
GlobalFlags
WritePrivateProfileStringA
GlobalFindAtomA
GlobalAddAtomA
GlobalGetAtomNameA
GetProcessVersion
SetErrorMode
GetCPInfo
GetOEMCP
GetStartupInfoA
RtlUnwind
RaiseException
HeapSize
GetACP
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
GetEnvironmentVariableA
HeapDestroy
HeapCreate
VirtualFree
IsBadWritePtr
LCMapStringW
SetUnhandledExceptionFilter
GetStringTypeA
GetStringTypeW
IsBadCodePtr
SetStdHandle
InterlockedExchange
CreateThread
GetVersion
lstrcatA
SetLastError
GetCurrentProcessId
GlobalAlloc
MultiByteToWideChar
GetSystemDirectoryA
lstrcpyA
Sleep
TerminateProcess
GetVersionExA
GetCurrentProcess
GetLastError
SetFilePointer
WriteFile
GlobalLock
GlobalUnlock
GlobalFree
FreeLibrary
GetCommandLineA
LCMapStringA
GetLocalTime
GetTickCount
GetModuleFileNameA
IsBadReadPtr
HeapFree
HeapReAlloc
HeapAlloc
ExitProcess
GetProcessHeap
WideCharToMultiByte
SetWaitableTimer
CreateWaitableTimerA
RtlFillMemory
lstrlenA
GetProcAddress
LoadLibraryA
VirtualAlloc
lstrcpynA
Process32Next
Process32First
CreateToolhelp32Snapshot
CreateEventA
OpenEventA
VirtualProtect
RtlMoveMemory
GetModuleHandleA
CloseHandle
OpenProcess
LocalFree
shlwapi
PathFileExistsA
user32
SetFocus
GetWindowPlacement
RegisterWindowMessageA
SetForegroundWindow
GetMessagePos
GetMessageTime
DefWindowProcA
RemovePropA
GetPropA
SetPropA
GetClassLongA
GetMenuItemID
GetSubMenu
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
GetTopWindow
CopyRect
AdjustWindowRectEx
MapWindowPoints
LoadIconA
LoadCursorA
GetSysColorBrush
LoadStringA
DestroyMenu
GetMenuCheckMarkDimensions
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetFocus
GetNextDlgTabItem
GetActiveWindow
GetKeyState
CallNextHookEx
ValidateRect
SetWindowsHookExA
GetLastActivePopup
EnableWindow
SetCursor
PostMessageA
PostQuitMessage
UnregisterHotKey
ScreenToClient
RegisterHotKey
LoadBitmapA
GetSysColor
CreateWindowExA
CallWindowProcA
WindowFromPoint
GetParent
GetWindow
PtInRect
GetWindowLongA
GetCursorPos
SetWindowLongA
GetDlgItem
ShowWindow
SystemParametersInfoA
GetDC
ReleaseDC
FindWindowA
SendMessageA
GetWindowRect
ReleaseCapture
SetCapture
GetMenuItemCount
SetWindowTextA
GetDlgCtrlID
DestroyWindow
UnhookWindowsHookEx
GrayStringA
DrawTextA
TabbedTextOutA
GetSystemMetrics
PeekMessageA
GetMessageA
TranslateMessage
DispatchMessageA
wsprintfA
MessageBoxA
MsgWaitForMultipleObjects
GetAsyncKeyState
GetForegroundWindow
ClientToScreen
GetClientRect
SetWindowPos
OpenIcon
IsIconic
GetClassNameA
GetWindowTextA
GetWindowTextLengthA
GetWindowThreadProcessId
IsWindowVisible
IsWindow
FindWindowExA
IsWindowEnabled
UnregisterClassA
gdi32
Escape
GetObjectA
GetStockObject
GetDeviceCaps
SelectObject
CreateFontA
TranslateCharsetInfo
CreateBitmap
SaveDC
RestoreDC
SetBkColor
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
GetClipBox
DeleteDC
SetMapMode
SetTextColor
PtVisible
RectVisible
TextOutA
ExtTextOutA
DeleteObject
advapi32
RegCreateKeyExA
RegOpenKeyA
CryptGetHashParam
CryptDestroyHash
CryptHashData
CryptReleaseContext
CryptCreateHash
CryptAcquireContextA
AdjustTokenPrivileges
LookupPrivilegeValueA
OpenProcessToken
RegQueryValueExA
RegSetValueExA
RegCloseKey
RegOpenKeyExA
winspool.drv
OpenPrinterA
ClosePrinter
DocumentPropertiesA
shell32
DragAcceptFiles
DragQueryFileA
DragFinish
comctl32
ImageList_BeginDrag
ImageList_Add
ImageList_Create
ImageList_Destroy
ImageList_DragEnter
ImageList_DragLeave
ImageList_DragMove
ImageList_DragShowNolock
ImageList_EndDrag
ord17
msvcrt
strncpy
iphlpapi
GetInterfaceInfo
psapi
GetMappedFileNameW
Sections
.text Size: 804KB - Virtual size: 804KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
. Size: 976KB - Virtual size: 976KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
. Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
必看说明.txt
-
效果图A.png.png
-
效果图B.png.png