Static task
static1
Behavioral task
behavioral1
Sample
bbacec01d6df0dc7849590231c03c709.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bbacec01d6df0dc7849590231c03c709.exe
Resource
win10v2004-20240226-en
General
-
Target
bbacec01d6df0dc7849590231c03c709
-
Size
111KB
-
MD5
bbacec01d6df0dc7849590231c03c709
-
SHA1
974290005654a3bf6d727291f60be8a017fd51ee
-
SHA256
67f1a2f341c170f6bfaf1cc0e37619ec3ffe65f86b21b10fd467a8efcbc24a19
-
SHA512
014f332263707fa3a04caa9de3551ca297f00ca003bdeb1ed242607264e019cfd41cc31b84eb71e54572f759f77d35037638f9b20cee27f247dac2c440f1dde6
-
SSDEEP
1536:OVejHMLv3OeRp/UvZupD6dqBQ5Xf50c1gST6ypX2BGZqW+kp4Q2:OVejHMT31RCaDOLhiWX2BSqW+jQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bbacec01d6df0dc7849590231c03c709
Files
-
bbacec01d6df0dc7849590231c03c709.exe windows:4 windows x86 arch:x86
bdd268077206dfc747de7f67a81bb943
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
GetDIBits
GetClipBox
SaveDC
CopyEnhMetaFileA
user32
SetClassLongA
DrawAnimatedRects
GetClassLongA
GetLastActivePopup
UnregisterClassA
CharNextW
UpdateWindow
MsgWaitForMultipleObjects
GetKeyboardLayout
GetDesktopWindow
GetMessagePos
FindWindowA
GetDC
SetWindowsHookExA
SetRect
GetFocus
ShowWindow
IntersectRect
RemovePropA
IsDialogMessageW
GetWindowDC
DispatchMessageW
MoveWindow
GetKeyboardLayoutNameA
RegisterWindowMessageA
IsWindowVisible
SetWindowTextA
ShowScrollBar
LoadKeyboardLayoutA
DestroyIcon
CloseClipboard
ClientToScreen
OpenClipboard
EnumChildWindows
IsDialogMessageA
SetActiveWindow
GetMenuItemID
ChildWindowFromPoint
GetWindowRect
SetTimer
DefMDIChildProcA
DrawMenuBar
SetParent
IsWindowEnabled
GetWindowThreadProcessId
InvalidateRect
IsZoomed
MapVirtualKeyA
SetWindowPos
GetKeyboardType
GetKeyState
wsprintfA
SetScrollInfo
GetCursor
GetClipboardData
GetMenuStringA
MessageBeep
RegisterClassA
GetCursorPos
GetIconInfo
MapWindowPoints
GetClassInfoA
DestroyMenu
PeekMessageA
SetMenu
CharLowerBuffA
DestroyWindow
SetWindowLongW
ActivateKeyboardLayout
CallNextHookEx
SetScrollPos
GetSystemMetrics
EqualRect
EmptyClipboard
RedrawWindow
DrawTextA
GetClassNameA
GetActiveWindow
UnhookWindowsHookEx
OffsetRect
ReleaseCapture
EnableWindow
RegisterClipboardFormatA
GetForegroundWindow
KillTimer
GetWindow
AdjustWindowRectEx
GetWindowLongA
SetMenuItemInfoA
LoadStringA
ReleaseDC
LoadCursorA
GetMenu
GetWindowLongW
GetKeyboardState
CreatePopupMenu
shell32
DragQueryFileA
Shell_NotifyIconA
SHGetDesktopFolder
oleaut32
VariantChangeType
SysAllocStringLen
SysStringLen
kernel32
lstrlenA
ExitThread
GetLastError
lstrcatA
SetEvent
GetModuleHandleA
VirtualAlloc
SetLastError
GetVersionExA
VirtualAllocEx
Sleep
GlobalFindAtomA
CreateEventA
ExitProcess
LocalAlloc
GetProcAddress
GetSystemDefaultLangID
version
VerInstallFileA
VerFindFileA
VerQueryValueA
shlwapi
SHEnumValueA
PathFileExistsA
SHSetValueA
SHDeleteKeyA
SHQueryInfoKeyA
PathGetCharTypeA
PathIsContentTypeA
comctl32
ImageList_Create
Sections
CODE Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 75KB - Virtual size: 75KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 1024B - Virtual size: 520B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ