d:\bpeqtqot\efcueeieh
Static task
static1
Behavioral task
behavioral1
Sample
b8cc7706f674c66b5cb7ef57adb8ffa9.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b8cc7706f674c66b5cb7ef57adb8ffa9.exe
Resource
win10v2004-20240226-en
General
-
Target
b8cc7706f674c66b5cb7ef57adb8ffa9
-
Size
485KB
-
MD5
b8cc7706f674c66b5cb7ef57adb8ffa9
-
SHA1
ce3e630e5a5dac18eeb77a502221de0dd4bc187b
-
SHA256
c6c04d930b64f3b770456d990fe1fd3078c3bb07f33c95fe472625ca361d5d8e
-
SHA512
74bbccdd0a0421f17e4507f15969eae4d474439fad1c836771164a505e54db583061c5d6801251f4ec2afe59753ac552433fa0f6f421345b31b3a2706ecffd4f
-
SSDEEP
12288:VTG85N2xfCZ/rV4Zakj6trHKKDxziA+qV4E9XRl:VTG8Kf0DWaRtrFxzQk4SXH
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b8cc7706f674c66b5cb7ef57adb8ffa9
Files
-
b8cc7706f674c66b5cb7ef57adb8ffa9.exe windows:4 windows x86 arch:x86
37bafc3f7d5922523cd0d97c96d9bf23
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
PDB Paths
Imports
kernel32
WriteConsoleOutputAttribute
GetConsoleMode
SetConsoleCtrlHandler
GetVolumeInformationA
FreeResource
GetLocaleInfoA
GetStartupInfoA
TerminateProcess
GetSystemTimeAsFileTime
GetModuleHandleA
CreateMutexA
GetVolumeInformationW
UnhandledExceptionFilter
InterlockedDecrement
GetProcAddress
GetLastError
IsValidCodePage
OpenMutexA
InitializeCriticalSection
GetLocalTime
HeapDestroy
CreateFileA
LeaveCriticalSection
GetACP
CompareStringA
FreeEnvironmentStringsW
WriteConsoleW
IsValidLocale
ReadFile
FreeLibrary
TlsFree
SetFilePointer
CompareStringW
GetStringTypeW
QueryPerformanceCounter
GetEnvironmentStrings
GetModuleFileNameA
HeapSize
WideCharToMultiByte
VirtualQuery
CloseHandle
HeapCreate
GetStartupInfoW
GetTimeFormatA
HeapFree
RtlUnwind
TlsAlloc
GetEnvironmentStringsW
GetDateFormatA
TlsSetValue
VirtualAlloc
FlushFileBuffers
LCMapStringW
LCMapStringA
WriteFile
InterlockedIncrement
SetHandleCount
SetUnhandledExceptionFilter
GetStdHandle
GetTickCount
InterlockedExchange
MultiByteToWideChar
GetVersionExA
TlsGetValue
HeapReAlloc
GetUserDefaultLCID
GetProcessHeap
GetStringTypeA
GetConsoleCP
GetCurrentThread
GetConsoleOutputCP
EnumSystemLocalesA
FindResourceExW
EnumSystemCodePagesA
GetCommandLineA
GetCPInfo
LoadLibraryA
SetLastError
GetCurrentThreadId
GetLocaleInfoW
ExitProcess
HeapAlloc
SetStdHandle
GetCurrentProcess
FreeEnvironmentStringsA
GetCurrentProcessId
GetCalendarInfoA
VirtualFree
GetOEMCP
SetEnvironmentVariableA
GetTimeZoneInformation
GetFileType
Sleep
WriteConsoleA
VirtualAllocEx
IsDebuggerPresent
DeleteCriticalSection
EnterCriticalSection
user32
GetClassNameW
DragDetect
CreateDialogIndirectParamA
LoadMenuW
RegisterClassA
GetWindowLongA
GetMonitorInfoW
RegisterClassExA
GetWindowRgn
CreateMenu
ArrangeIconicWindows
IsDlgButtonChecked
GetClassInfoW
ModifyMenuA
ChangeDisplaySettingsA
GetCursor
GetActiveWindow
GetMenuState
ScreenToClient
comctl32
ImageList_ReplaceIcon
InitCommonControlsEx
ImageList_Copy
ImageList_GetIcon
ImageList_GetBkColor
_TrackMouseEvent
ImageList_GetImageCount
CreateStatusWindowA
ImageList_SetFlags
ImageList_DragMove
ImageList_GetIconSize
DestroyPropertySheetPage
DrawStatusText
GetEffectiveClientRect
DrawStatusTextA
advapi32
CryptVerifySignatureA
ReportEventA
CryptSetProviderW
LookupAccountSidA
InitiateSystemShutdownW
LookupPrivilegeNameW
Sections
.text Size: 324KB - Virtual size: 324KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 39KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 104KB - Virtual size: 103KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ