Static task
static1
Behavioral task
behavioral1
Sample
bcec5c771bf92d3552a0b833310a5438.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bcec5c771bf92d3552a0b833310a5438.exe
Resource
win10v2004-20240226-en
General
-
Target
bcec5c771bf92d3552a0b833310a5438
-
Size
3.6MB
-
MD5
bcec5c771bf92d3552a0b833310a5438
-
SHA1
e7214704485bb89bc309b8935b1cbf495e257be9
-
SHA256
db99bf433a7838b76e697f8fd785872d6f6af921b11ae01abc9c6e417b17f6ca
-
SHA512
ffad1698bdaf79bb3352d6d6658759ce4fcf94227aba8a1e60b6ee59e887e9c7c0630433bec468d25dce5aaf6ff11b4d7c4bef2ecf6256b346fa5b0b501734a4
-
SSDEEP
49152:Ewv0P0UHXU+2UySU89UwLDhGXOFedokT3R+4okvI:EwUHXU+2UySU89UwLFdU+Dd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bcec5c771bf92d3552a0b833310a5438
Files
-
bcec5c771bf92d3552a0b833310a5438.exe windows:4 windows x86 arch:x86
b5955a4b42743994a9f4c27da34fd692
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
advapi32
RegDeleteKeyA
RegOpenKeyExA
RegCloseKey
RegOpenKeyA
RegCreateKeyExA
RegDeleteValueA
RegSetValueExA
RegQueryValueExA
comctl32
InitCommonControls
gdi32
IntersectClipRect
Escape
ExtTextOutA
RectVisible
PtVisible
OffsetClipRgn
CreatePatternBrush
CreateHatchBrush
ExtCreatePen
CreatePen
GetWindowExtEx
GetViewportExtEx
PlayMetaFile
EnumMetaFile
GetObjectType
PlayMetaFileRecord
ExtSelectClipRgn
SelectClipPath
CreateRectRgn
GetClipRgn
PolyBezierTo
SetColorAdjustment
CreateDIBPatternBrushPt
MoveToEx
PolylineTo
PolyDraw
SetArcDirection
ArcTo
GetCurrentPositionEx
SetMapperFlags
SetTextCharacterExtra
SetTextJustification
SetTextAlign
LineTo
SetTextColor
CreateSolidBrush
CreateFontA
DeleteObject
SelectObject
SetBkMode
GetStockObject
CreateBitmap
GetDCOrgEx
GetClipBox
SetBkColor
GetObjectA
GetDeviceCaps
DeleteDC
StartDocA
SaveDC
RestoreDC
SelectPalette
SetPolyFillMode
SetROP2
SetStretchBltMode
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowOrgEx
OffsetWindowOrgEx
SetWindowExtEx
ScaleWindowExtEx
SelectClipRgn
ExcludeClipRect
TextOutA
kernel32
GetCurrentProcess
GetModuleFileNameA
VirtualQueryEx
OutputDebugStringA
GetPrivateProfileStringA
FindFirstFileA
InterlockedExchange
InterlockedDecrement
InterlockedExchangeAdd
FreeLibrary
GetProcAddress
LoadLibraryA
WriteFile
lstrlen
WideCharToMultiByte
MultiByteToWideChar
LocalFree
FileTimeToSystemTime
FileTimeToLocalFileTime
RestoreLastError
lstrcpyn
lstrcmp
LocalAlloc
TlsAlloc
GlobalUnlock
GlobalHandle
TlsFree
GlobalLock
GlobalReAlloc
TlsSetValue
LocalReAlloc
TlsGetValue
GetVersion
SetEvent
ResumeThread
SetThreadPriority
GetCurrentThreadId
SuspendThread
CreateEventA
GetCurrentThread
GetModuleHandleA
GlobalDeleteAtom
GlobalFindAtomA
GlobalAddAtomA
lstrcmpi
GlobalGetAtomNameA
lstrcat
LockResource
LoadResource
FindResourceA
GetProcessVersion
MulDiv
GlobalFlags
GetCPInfo
GetOEMCP
WritePrivateProfileStringA
GetCurrentDirectoryA
SetErrorMode
DuplicateHandle
SetFilePointer
FlushFileBuffers
LockFile
UnlockFile
SetEndOfFile
MoveFileA
DeleteFileA
FindClose
GetVolumeInformationA
GetFullPathNameA
GetStringTypeExA
GetThreadLocale
GetShortPathNameA
GetFileAttributesA
GetFileTime
LocalFileTimeToFileTime
SystemTimeToFileTime
SetFileTime
SetFileAttributesA
RtlUnwind
ExitThread
GetTimeZoneInformation
GetSystemTime
GetStartupInfoA
GetCommandLineA
ExitProcess
GetACP
RaiseException
HeapSize
HeapReAlloc
TerminateProcess
UnhandledExceptionFilter
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
IsBadWritePtr
FatalAppExitA
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
LockResource
GetStdHandle
GetFileType
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
SetUnhandledExceptionFilter
IsBadReadPtr
IsBadCodePtr
SetStdHandle
IsValidLocale
IsValidCodePage
GetLocaleInfoA
EnumSystemLocalesA
GetUserDefaultLCID
SetConsoleCtrlHandler
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetLocaleInfoW
GetThreadContext
CreateFileA
CreateDirectoryA
GlobalAlloc
GlobalFree
GetProcessHeap
HeapAlloc
HeapFree
InitializeCriticalSectionAndSpinCount
GetQueuedCompletionStatus
GetSystemInfo
CreateIoCompletionPort
PostQueuedCompletionStatus
GetLastError
FormatMessageA
TerminateThread
OpenFile
GetFileSize
_lclose
ReadFile
GetPrivateProfileIntA
GetLocalTime
InterlockedIncrement
Sleep
WaitForSingleObject
CloseHandle
CreateThread
GetTickCount
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSection
lstrcpy
shell32
DragAcceptFiles
SHGetFileInfo
user32
EnableWindow
GetWindowLongA
IsWindowEnabled
GetLastActivePopup
GetParent
UnhookWindowsHookEx
SetWindowsHookExA
GetCursorPos
PeekMessageA
IsWindowVisible
ValidateRect
CallNextHookEx
GetKeyState
GetActiveWindow
GetNextDlgTabItem
GetFocus
EnableMenuItem
CheckMenuItem
SetMenuItemBitmaps
ModifyMenuA
GetMenuState
LoadBitmapA
GetMenuCheckMarkDimensions
GetSystemMetrics
GetWindowRect
GetWindowPlacement
IsIconic
SystemParametersInfoA
IntersectRect
OffsetRect
RegisterClipboardFormatA
SetWindowPos
GetWindow
SetForegroundWindow
GetForegroundWindow
GetMessagePos
GetMessageTime
RemovePropA
GetPropA
SetPropA
GetClassLongA
GetDlgCtrlID
GetWindowTextA
GetWindowTextLengthA
SetWindowPlacement
TrackPopupMenu
GetMenuItemID
GetSubMenu
GetMenuItemCount
GetMenu
RegisterClassA
GetClassInfoA
WinHelpA
GetCapture
IsChild
GetTopWindow
SetScrollPos
GetScrollPos
SetScrollRange
GetScrollRange
ShowScrollBar
SetScrollInfo
GetScrollInfo
ScrollWindow
EndDeferWindowPos
CopyRect
BeginDeferWindowPos
DeferWindowPos
OemToCharA
ScreenToClient
AdjustWindowRectEx
SetFocus
SetActiveWindow
GetSysColor
MapWindowPoints
SendDlgItemMessageA
PostMessageA
CheckDlgButton
CheckRadioButton
GetDlgItemInt
GetDlgItemTextA
SetDlgItemInt
IsDlgButtonChecked
ScrollWindowEx
IsDialogMessage
MoveWindow
GetSysColorBrush
GetClassNameA
PtInRect
ClientToScreen
GetDesktopWindow
DestroyMenu
GetWindowDC
BeginPaint
EndPaint
TabbedTextOutA
DrawTextA
GrayStringA
ShowOwnedPopups
SetCursor
InsertMenuA
DeleteMenu
GetMenuStringA
CharUpperA
DefWindowProcA
KillTimer
DestroyWindow
PostQuitMessage
CreateWindowExA
UpdateWindow
LoadIconA
LoadCursorA
RegisterClassExA
SetTimer
LoadStringA
LoadAcceleratorsA
GetMessageA
TranslateAccelerator
TranslateMessage
DispatchMessageA
SetWindowTextA
GetClientRect
FillRect
CallWindowProcA
SetWindowLongA
GetDC
ReleaseDC
SetRect
MessageBoxA
IsWindow
CreateDialogParamA
ShowWindow
GetDlgItem
EndDialog
SetDlgItemTextA
SendMessageA
wsprintfA
CharToOemA
EqualRect
DialogBoxParamA
winspool.drv
ClosePrinter
OpenPrinterA
DocumentPropertiesA
ws2_32
WSAAccept
WSARecv
WSASocketA
WSASendTo
WSASend
wsock32
send
WSAStartup
accept
inet_ntoa
setsockopt
htonl
htons
bind
WSAGetLastError
closesocket
listen
recv
connect
recvfrom
WSAAsyncSelect
socket
inet_addr
gethostname
gethostbyname
shutdown
WSACleanup
sendto
comdlg32
GetFileTitleA
dbghelp
SymLoadModule
SymGetOptions
SymSetOptions
SymInitialize
SymFunctionTableAccess
SymGetLineFromAddr
SymGetSymFromAddr
SymGetModuleInfo
StackWalk
Sections
0 Size: 2.9MB - Virtual size: 196.7MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
1 Size: 629KB - Virtual size: 632KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
2 Size: 13KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
3 Size: 71KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
4 Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
5 Size: 28KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.mackt Size: 10KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE