Static task
static1
Behavioral task
behavioral1
Sample
bdec8ce34aaf236d8d6211ec792ffd9aaee924cf90eccbe59a82abd1a1853209.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bdec8ce34aaf236d8d6211ec792ffd9aaee924cf90eccbe59a82abd1a1853209.exe
Resource
win10v2004-20240226-en
General
-
Target
bdec8ce34aaf236d8d6211ec792ffd9aaee924cf90eccbe59a82abd1a1853209
-
Size
350KB
-
MD5
747329a9854683a4751d9ec11d0c3050
-
SHA1
313349eff2ef2c7a65228448616ccbe0b9b94302
-
SHA256
bdec8ce34aaf236d8d6211ec792ffd9aaee924cf90eccbe59a82abd1a1853209
-
SHA512
4620826b4cbfb52cf96d7273a28c724c3e1d8487841ffe2cdfb9785351303ab521b3f4e8884dd6fd6f1fbc063b9151ff6a0cd287d339cbea7fc97a6ea03128b4
-
SSDEEP
6144:yEWL/ZlJI4xHTBq9u6FlebaWvRhC34Rk6Zwv0:EldRTs9uule+qYFxv0
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource bdec8ce34aaf236d8d6211ec792ffd9aaee924cf90eccbe59a82abd1a1853209
Files
-
bdec8ce34aaf236d8d6211ec792ffd9aaee924cf90eccbe59a82abd1a1853209.exe windows:4 windows x86 arch:x86
b9c8336855f29b991e7b44eed07f101b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
memset
memcpy
malloc
free
fseek
ftell
fread
_wfopen
longjmp
_setjmp3
fclose
wcscmp
sprintf
_stricmp
strcmp
tolower
wcslen
wcscpy
_wcsicmp
fabs
ceil
floor
pow
gmtime
frexp
modf
_CIpow
fwrite
fflush
_vsnwprintf
kernel32
GetModuleHandleW
HeapCreate
HeapDestroy
ExitProcess
VirtualAlloc
GetCurrentThreadId
GetCurrentProcessId
FreeLibrary
LoadLibraryA
GetProcAddress
HeapFree
LoadLibraryW
WideCharToMultiByte
HeapAlloc
DeleteFileW
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetVersionExW
HeapReAlloc
DeleteCriticalSection
Sleep
TlsAlloc
lstrlenA
user32
MessageBoxW
GetWindowThreadProcessId
IsWindowVisible
GetWindowLongA
GetForegroundWindow
IsWindowEnabled
EnableWindow
EnumWindows
SetWindowPos
DestroyWindow
GetFocus
GetParent
GetClassNameW
EnumPropsExW
GetPropW
GetWindow
SetActiveWindow
RemovePropW
SendMessageW
UnregisterClassW
DestroyAcceleratorTable
LoadIconW
LoadCursorW
DefWindowProcA
RegisterClassA
CreateWindowExA
RegisterWindowMessageA
FillRect
DestroyIcon
gdi32
GetStockObject
DeleteObject
GetObjectW
CreateCompatibleDC
GetDIBits
DeleteDC
GetObjectType
CreateDIBSection
SelectObject
BitBlt
CreateBitmap
SetPixel
comctl32
InitCommonControlsEx
ole32
CoInitialize
RevokeDragDrop
wsock32
closesocket
WSACleanup
WSAStartup
Sections
.code Size: 1024B - Virtual size: 638B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 80KB - Virtual size: 79KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 113KB - Virtual size: 113KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 134KB - Virtual size: 134KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ