Static task
static1
Behavioral task
behavioral1
Sample
bac06da1a36ee33cd0cfdd7ca0e440af.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bac06da1a36ee33cd0cfdd7ca0e440af.exe
Resource
win10v2004-20240226-en
General
-
Target
bac06da1a36ee33cd0cfdd7ca0e440af
-
Size
2.0MB
-
MD5
bac06da1a36ee33cd0cfdd7ca0e440af
-
SHA1
a4de168e3924bf5240a6c96757124b04294aaa1d
-
SHA256
dc8629d52d9391650d46a2c656b88fdfbcbd4dcd0222a9a9ed9f9c051010e86d
-
SHA512
9529177f4cb1774a8082b06711075c908d9cbd3d30e6e43aa4cf408057a932209ac598c7cbd4016a93e0fd6cc29b91c393eeffb9d1af472e1a8cdaffef9b20ec
-
SSDEEP
49152:NOQcOhjWGG7gQqe1f6/wYz5gCflnmS1tOXRJ4MBbOv8+:NPcaqGGv2wfUyhmMt
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bac06da1a36ee33cd0cfdd7ca0e440af
Files
-
bac06da1a36ee33cd0cfdd7ca0e440af.exe windows:4 windows x86 arch:x86
7c976a630fc13e5f533be3290274a142
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalFlags
SetErrorMode
GetCPInfo
GetOEMCP
HeapFree
GetSystemTimeAsFileTime
GetTimeFormatA
GetDateFormatA
HeapAlloc
HeapReAlloc
VirtualAlloc
GetSystemInfo
VirtualQuery
GetCommandLineA
GetProcessHeap
GetStartupInfoA
RtlUnwind
RaiseException
ExitProcess
SetStdHandle
GetFileType
HeapSize
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetACP
TlsFree
GetStringTypeA
GetStringTypeW
HeapDestroy
HeapCreate
VirtualFree
GetTimeZoneInformation
GetStdHandle
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
QueryPerformanceCounter
GetConsoleCP
GetConsoleMode
LCMapStringA
LCMapStringW
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
SetEnvironmentVariableA
LocalReAlloc
TlsSetValue
TlsAlloc
GlobalHandle
GlobalReAlloc
TlsGetValue
InterlockedIncrement
GetFileTime
GetFileAttributesA
GlobalGetAtomNameA
GlobalFindAtomA
lstrcmpW
GetVersionExA
GetFullPathNameA
GetVolumeInformationA
FindFirstFileA
FindClose
DuplicateHandle
GetFileSize
SetEndOfFile
UnlockFile
LockFile
FlushFileBuffers
SetFilePointer
WriteFile
ReadFile
GetThreadLocale
FreeResource
GlobalAddAtomA
GlobalDeleteAtom
GetCurrentThread
ConvertDefaultLocale
EnumResourceLanguagesA
GetLocaleInfoA
lstrcmpA
GetCurrentThreadId
InterlockedDecrement
GetModuleFileNameW
GetPrivateProfileStringA
WritePrivateProfileStringA
GlobalFree
GlobalAlloc
GlobalLock
GlobalUnlock
MulDiv
FormatMessageA
LocalFree
FreeLibrary
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
SetLastError
FileTimeToLocalFileTime
FileTimeToSystemTime
InterlockedExchange
GetVersion
lstrlenA
CompareStringA
CompareStringW
CreateFileMappingA
MapViewOfFile
OpenFileMappingA
GetCurrentProcessId
DeleteFileA
VirtualProtect
GetModuleHandleA
GetLastError
CreateFileA
GetModuleFileNameA
Sleep
CloseHandle
CreateThread
CreateMutexA
LocalAlloc
GetComputerNameA
GetProcAddress
GetTickCount
GetCurrentProcess
TerminateProcess
MultiByteToWideChar
OpenProcess
ExpandEnvironmentStringsA
FindResourceA
WaitForSingleObject
LoadResource
CreateRemoteThread
LockResource
WriteProcessMemory
SizeofResource
VirtualAllocEx
LoadLibraryA
WideCharToMultiByte
IsValidCodePage
user32
PostThreadMessageA
DestroyMenu
GetMenuItemInfoA
InflateRect
MessageBeep
GetNextDlgGroupItem
InvalidateRgn
SetRect
CopyAcceleratorTableA
CharNextA
UnregisterClassA
GetSysColorBrush
ReleaseCapture
LoadCursorA
SetCapture
KillTimer
SetTimer
SetWindowRgn
IsRectEmpty
FindWindowA
InvalidateRect
EndPaint
BeginPaint
GetWindowDC
ReleaseDC
GetDC
ClientToScreen
GrayStringA
DrawTextExA
DrawTextA
TabbedTextOutA
FillRect
ShowWindow
MoveWindow
SetWindowTextA
IsDialogMessageA
SetDlgItemTextA
RegisterWindowMessageA
SendDlgItemMessageA
WinHelpA
IsChild
GetCapture
GetClassLongA
GetClassNameA
SetPropA
GetPropA
RemovePropA
SetFocus
GetWindowTextA
GetForegroundWindow
BeginDeferWindowPos
EndDeferWindowPos
GetTopWindow
GetMessageTime
GetMessagePos
MapWindowPoints
ScrollWindow
TrackPopupMenu
SetScrollRange
SetScrollPos
GetScrollPos
SetForegroundWindow
ShowScrollBar
UpdateWindow
GetMenu
CreateWindowExA
GetClassInfoExA
GetClassInfoA
RegisterClassA
GetSysColor
AdjustWindowRectEx
ScreenToClient
EqualRect
DeferWindowPos
CopyRect
GetScrollInfo
SetScrollInfo
PtInRect
GetDlgCtrlID
DefWindowProcA
CallWindowProcA
SetWindowLongA
OffsetRect
IntersectRect
SystemParametersInfoA
GetWindowPlacement
GetWindowRect
SetMenuItemBitmaps
GetMenuCheckMarkDimensions
LoadBitmapA
GetFocus
ModifyMenuA
EnableMenuItem
CheckMenuItem
SetActiveWindow
CreateDialogIndirectParamA
DestroyWindow
IsWindow
GetDlgItem
GetNextDlgTabItem
EndDialog
ShowOwnedPopups
SetCursor
GetWindow
SetWindowContextHelpId
MapDialogRect
SetWindowPos
PostMessageA
RegisterClipboardFormatA
UnpackDDElParam
ReuseDDElParam
LoadMenuA
LoadAcceleratorsA
PostQuitMessage
SetWindowsHookExA
InsertMenuItemA
CreatePopupMenu
SetRectEmpty
BringWindowToTop
SetMenu
GetWindowTextLengthA
TranslateAcceleratorA
CallNextHookEx
GetMessageA
TranslateMessage
DispatchMessageA
GetActiveWindow
GetKeyState
PeekMessageA
GetCursorPos
ValidateRect
GetWindowThreadProcessId
GetParent
GetWindowLongA
GetLastActivePopup
IsWindowEnabled
UnhookWindowsHookEx
GetMenuState
GetMenuItemID
GetMenuItemCount
GetSubMenu
GetDesktopWindow
CharUpperA
GetSystemMetrics
IsWindowVisible
IsIconic
GetClientRect
SendMessageA
EnableWindow
DrawIcon
LoadIconA
wsprintfA
MessageBoxA
GetScrollRange
gdi32
TextOutA
CreateSolidBrush
CreateEllipticRgn
LPtoDP
Ellipse
GetBkColor
GetTextColor
CreateRectRgnIndirect
GetRgnBox
CreateFontIndirectA
CreateCompatibleBitmap
GetMapMode
RectVisible
PtVisible
GetStockObject
CreateCompatibleDC
CreatePatternBrush
DeleteDC
ExtSelectClipRgn
ScaleWindowExtEx
SetWindowExtEx
ScaleViewportExtEx
SetViewportExtEx
OffsetViewportOrgEx
SetViewportOrgEx
SelectObject
Escape
GetTextExtentPoint32A
GetDeviceCaps
GetPixel
BitBlt
GetWindowExtEx
GetViewportExtEx
DeleteObject
SetMapMode
SetBkMode
RestoreDC
SaveDC
GetObjectA
SetBkColor
SetTextColor
GetClipBox
CreateBitmap
ExtTextOutA
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
DocumentPropertiesA
ClosePrinter
advapi32
RegCreateKeyExA
RegQueryValueA
RegEnumKeyA
RegDeleteKeyA
RegSetValueExA
RegQueryValueExA
RegOpenKeyExA
AllocateAndInitializeSid
RegOpenKeyA
RegCloseKey
FreeSid
SetSecurityInfo
AddAccessAllowedAce
AddAccessDeniedAce
InitializeAcl
GetUserNameA
GetTokenInformation
OpenProcessToken
shell32
DragFinish
DragQueryFileA
comctl32
ord17
shlwapi
PathFindExtensionA
PathFindFileNameA
PathStripToRootA
UrlUnescapeA
PathIsUNCA
oledlg
ord8
ole32
CoRegisterMessageFilter
OleFlushClipboard
CoTaskMemFree
CoTaskMemAlloc
CLSIDFromProgID
CLSIDFromString
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
OleUninitialize
CoFreeUnusedLibraries
OleInitialize
CoRevokeClassObject
OleIsCurrentClipboard
oleaut32
OleCreateFontIndirect
SystemTimeToVariantTime
VariantTimeToSystemTime
SafeArrayDestroy
VariantCopy
SafeArrayCreate
SafeArrayGetDim
SafeArrayGetElemsize
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayAccessData
SafeArrayUnaccessData
SysAllocString
VariantInit
VariantChangeType
VariantClear
SysAllocStringLen
SysStringLen
SysFreeString
SysAllocStringByteLen
wsock32
closesocket
recv
send
shutdown
WSAStartup
WSACleanup
connect
inet_addr
gethostbyname
socket
getpeername
htons
ioctlsocket
select
psapi
GetModuleFileNameExA
EnumProcesses
wininet
InternetOpenUrlA
InternetReadFile
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallback
InternetOpenA
InternetGetLastResponseInfoA
InternetCloseHandle
HttpQueryInfoA
InternetQueryDataAvailable
InternetCrackUrlA
InternetQueryOptionA
InternetSetOptionExA
InternetCanonicalizeUrlA
Sections
.text Size: 272KB - Virtual size: 272KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 67KB - Virtual size: 68KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 13KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data0 Size: 292KB - Virtual size: 292KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE