Static task
static1
Behavioral task
behavioral1
Sample
bce67b4a22e1c0c2b292eb0144b22e50.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
bce67b4a22e1c0c2b292eb0144b22e50.exe
Resource
win10v2004-20240226-en
General
-
Target
bce67b4a22e1c0c2b292eb0144b22e50
-
Size
271KB
-
MD5
bce67b4a22e1c0c2b292eb0144b22e50
-
SHA1
84d8648001806f07237a5f9cefc413b74b38856c
-
SHA256
2bae7e7dbc62a5f31973addb4641dc94ba06b0181f35d240a745dbb3bae28610
-
SHA512
83a58f48524a5d4520ffd67296ed64bc95b4b1f0b17cee97e5920053e0199e12604b8a0fd7022ff5edcf5301b43da63d43b8381c50d1f24c289c9fa644125e0a
-
SSDEEP
6144:O0vsSRYQsNWZae/vy+C3ppgktHG+s7Osqx3TG:hEgYVnbZbHGPOsqFTG
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bce67b4a22e1c0c2b292eb0144b22e50
Files
-
bce67b4a22e1c0c2b292eb0144b22e50.exe windows:4 windows x86 arch:x86
566058ec45f71f4ed5437dd72f0d14c6
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
IsDebuggerPresent
SetThreadPriority
CreateFileW
EnumDateFormatsA
GetPrivateProfileStringW
GetFileAttributesW
GetModuleFileNameW
SuspendThread
WaitForMultipleObjects
CreateEventW
FindNextFileW
OutputDebugStringW
DeleteFileW
CreateDirectoryW
TerminateProcess
MultiByteToWideChar
FileTimeToSystemTime
FreeLibrary
GetProcAddress
LoadLibraryA
WideCharToMultiByte
DeleteFileA
GetFileAttributesA
GetTempPathA
GetTempPathW
ReadFile
WriteFile
SetFilePointer
FlushFileBuffers
SetEndOfFile
GetFileSize
oleaut32
SafeArraySetRecordInfo
SysAllocStringByteLen
SafeArraySetIID
SysReAllocStringLen
OleIconToCursor
ClearCustData
SetOaNoCache
msvfw32
ICInfo
Sections
.text Size: 159KB - Virtual size: 206KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 109KB - Virtual size: 109KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 512B - Virtual size: 246B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ