Static task
static1
Behavioral task
behavioral1
Sample
bcb11fe1ca7a11d7597452cba626a4f5d65d05d785b65c6199b0fc1a1d4d539f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bcb11fe1ca7a11d7597452cba626a4f5d65d05d785b65c6199b0fc1a1d4d539f.exe
Resource
win10v2004-20240226-en
General
-
Target
bcb11fe1ca7a11d7597452cba626a4f5d65d05d785b65c6199b0fc1a1d4d539f
-
Size
252KB
-
MD5
01819a424cf56b32de643fe6c827875f
-
SHA1
6c57b71da1bc8b5506cd7ac6f160e1c4c1127c61
-
SHA256
bcb11fe1ca7a11d7597452cba626a4f5d65d05d785b65c6199b0fc1a1d4d539f
-
SHA512
e1e4e762d90624a2ac2a912230fb164d2e0c449e2cff47dd3f1695790f6c50ac243743387bfd2e3fdcff6301400240da402b3eb1d6f88c9cc0147309c7ce6adb
-
SSDEEP
6144:tChyVsfqxZQ+CV3ICJ3Eum+SWGMBI8kNR/En5mb35/hsGRzb:t0yVZG+CV139bDM7a4hsk
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bcb11fe1ca7a11d7597452cba626a4f5d65d05d785b65c6199b0fc1a1d4d539f
Files
-
bcb11fe1ca7a11d7597452cba626a4f5d65d05d785b65c6199b0fc1a1d4d539f.exe windows:4 windows x86 arch:x86
5e0871831cc4d72839f1cc7456db4e97
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord2982
ord3147
ord3259
ord4465
ord3136
ord3262
ord2985
ord3081
ord2976
ord3830
ord3831
ord3825
ord3079
ord4080
ord4622
ord4424
ord3738
ord561
ord815
ord6215
ord2086
ord823
ord641
ord801
ord616
ord609
ord692
ord765
ord690
ord2514
ord2621
ord1134
ord860
ord2818
ord540
ord535
ord939
ord924
ord4278
ord6662
ord858
ord6283
ord6282
ord5683
ord6663
ord4129
ord2764
ord941
ord668
ord1980
ord3181
ord3178
ord2781
ord2770
ord356
ord5265
ord4376
ord4853
ord4998
ord4710
ord6052
ord4078
ord1775
ord4407
ord5241
ord2385
ord5163
ord6374
ord4353
ord5280
ord3798
ord4837
ord4441
ord2648
ord2055
ord6376
ord3749
ord5065
ord1727
ord5261
ord5714
ord2124
ord5277
ord4627
ord4425
ord3597
ord324
ord4234
ord3698
ord2411
ord2023
ord4218
ord2578
ord4398
ord3582
ord1771
ord6366
ord2413
ord2024
ord4219
ord2581
ord4401
ord3639
ord2575
ord6055
ord1776
ord4396
ord5290
ord3402
ord3574
ord2614
ord1146
ord1168
ord389
ord567
ord541
ord2370
ord2302
ord922
ord6059
ord4160
ord2863
ord2379
ord755
ord470
ord6426
ord3229
ord1228
ord3874
ord3092
ord2642
ord6199
ord798
ord1997
ord6392
ord5194
ord533
ord5808
ord6058
ord5424
ord5204
ord6334
ord3317
ord2652
ord6883
ord4202
ord1669
ord6143
ord5353
ord926
ord6877
ord6781
ord3663
ord6648
ord6929
ord5608
ord4058
ord5440
ord6383
ord5450
ord6394
ord5289
ord5307
ord4698
ord4079
ord2725
ord5302
ord5300
ord3346
ord2396
ord5199
ord1089
ord3922
ord5731
ord2512
ord2554
ord4486
ord6375
ord4274
ord4673
ord1200
ord537
ord800
ord2446
ord825
ord1576
msvcrt
__p__fmode
__set_app_type
_except_handler3
_controlfp
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
_acmdln
exit
_XcptFilter
_exit
??1type_info@@UAE@XZ
_onexit
__dllonexit
strstr
_access
rename
_ftol
_mbsicmp
atof
atol
strrchr
__CxxFrameHandler
free
sprintf
_mbscmp
malloc
_setmbcp
__p__commode
kernel32
GetProcAddress
FreeLibrary
SetCurrentDirectoryA
GetCurrentDirectoryA
GetModuleFileNameA
GetSystemDirectoryA
GetPrivateProfileStringA
WritePrivateProfileStringA
CreateDirectoryA
GetFileAttributesA
DeleteFileA
SetFileAttributesA
RemoveDirectoryA
WinExec
TerminateProcess
OpenProcess
CloseHandle
Process32Next
Process32First
CreateToolhelp32Snapshot
GetModuleHandleA
GetStartupInfoA
LoadLibraryA
user32
DrawIcon
GetClientRect
GetSystemMetrics
IsIconic
GetSystemMenu
TranslateMessage
PeekMessageA
EnableWindow
AppendMenuA
DispatchMessageA
LoadIconA
SendMessageA
shell32
ShellExecuteA
Sections
.text Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 212KB - Virtual size: 212KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE