Static task
static1
Behavioral task
behavioral1
Sample
bb00477a2e19056dd86f5b5d709f74a2.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bb00477a2e19056dd86f5b5d709f74a2.exe
Resource
win10v2004-20240226-en
General
-
Target
bb00477a2e19056dd86f5b5d709f74a2
-
Size
304KB
-
MD5
bb00477a2e19056dd86f5b5d709f74a2
-
SHA1
80a699110479d0b571c0357964fb8cb1d843b859
-
SHA256
7e7ae776c27c6d7c55dc947efb9098793e5ea09cd56910fcc303b3c1a5cdecc0
-
SHA512
9c052e8de6e261ebaf9f7de7fe1a1a0ca4c2317b50d826fbcf51fb3644343b7eb2c83325ed968ff78cb19127a0e235625142ae699c57b061e1d92cf86a25585d
-
SSDEEP
6144:CC33n2m8YMJ7CRvqlehR395W4X5GYZSn2/iauAQNWa:Cm32m8YMYqlo5W4Zk4fiWa
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bb00477a2e19056dd86f5b5d709f74a2
Files
-
bb00477a2e19056dd86f5b5d709f74a2.exe windows:4 windows x86 arch:x86
b7ea6930adf3da748ce7c84c00eb1451
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReadFile
LocalFree
ResumeThread
GetDriveTypeW
HeapCreate
GetCurrentThreadId
CreateEventW
SetLastError
GetConsoleAliasW
GetCurrentProcessId
SetEvent
FindAtomW
lstrlenW
FindClose
EnterCriticalSection
TlsGetValue
GetModuleHandleA
GetPrivateProfileStringW
GetNumberFormatW
EnumCalendarInfoW
user32
CallWindowProcW
IsWindow
GetMenuInfo
GetKeyState
GetClassInfoA
SetFocus
GetCursorInfo
DrawTextA
DispatchMessageA
GetSysColor
DispatchMessageA
GetKeyboardType
GetClientRect
unimdmat
UmCloseModem
UmCloseModem
UmCloseModem
UmCloseModem
UmCloseModem
msasn1
ASN1BERDecBool
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 416KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 295KB - Virtual size: 294KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ