Static task
static1
Behavioral task
behavioral1
Sample
bbf4779e37f8a73cdb4f6a0d3a25a19a.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
bbf4779e37f8a73cdb4f6a0d3a25a19a.exe
Resource
win10v2004-20231215-en
General
-
Target
bbf4779e37f8a73cdb4f6a0d3a25a19a
-
Size
490KB
-
MD5
bbf4779e37f8a73cdb4f6a0d3a25a19a
-
SHA1
674d96acd412bb64adf71c74ba66677827623581
-
SHA256
5586f535e0a6f3ffd88530189c980c001041e5e0511527b85d759e99014a96be
-
SHA512
0e0821485e94fa84fa5019f24708f0cb4f2559bffb06139c21b69f1ffaae254342afa09195785d1b0e32197bed50a22b7c73c09b3c8e9cef211a23cd2026ec01
-
SSDEEP
12288:QImJrpW1VeZpKwdG7OK7xW/QgP3GZGoRvfxW:QIK06PKw4JNWNcJxW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bbf4779e37f8a73cdb4f6a0d3a25a19a
Files
-
bbf4779e37f8a73cdb4f6a0d3a25a19a.exe windows:4 windows x86 arch:x86
1c1952daa129e3232ec76522d995014d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
InitCommonControlsEx
user32
SetDoubleClickTime
GetCursorPos
ChangeDisplaySettingsExW
ScrollWindow
GetWindowPlacement
IntersectRect
RegisterClassA
RegisterClassExA
WaitForInputIdle
kernel32
GetConsoleCP
HeapAlloc
GetCommandLineW
Sleep
OpenMutexA
GetStartupInfoW
GetLocaleInfoA
GetCurrentThreadId
SetUnhandledExceptionFilter
SetEnvironmentVariableA
IsValidCodePage
HeapFree
LoadLibraryA
TlsAlloc
GetModuleFileNameW
WideCharToMultiByte
CopyFileA
GetModuleHandleA
GetStartupInfoA
FreeEnvironmentStringsW
SetStdHandle
GetTimeZoneInformation
GetFileType
GetTimeFormatA
GetStdHandle
GetDateFormatA
CloseHandle
GetCPInfo
ExitProcess
EnumSystemLocalesA
TlsFree
GetCurrentThread
LeaveCriticalSection
GetCommandLineA
CreateFileA
GlobalFindAtomW
GetDiskFreeSpaceExW
DeleteCriticalSection
CopyFileExA
GetLocaleInfoW
VirtualFree
GetEnvironmentStringsW
InitializeCriticalSection
InterlockedIncrement
GetCurrentProcess
GetUserDefaultLCID
SetLocaleInfoW
HeapCreate
VirtualAlloc
GetCurrentProcessId
TlsGetValue
GetLastError
SetFilePointer
GetDiskFreeSpaceA
HeapSize
CompareStringW
HeapDestroy
GetStringTypeA
GetProcAddress
GetModuleFileNameA
GetConsoleOutputCP
LoadModule
GetOEMCP
InterlockedExchangeAdd
WriteConsoleW
GetConsoleMode
SetLastError
VirtualQuery
GetSystemTimeAsFileTime
TlsSetValue
SetHandleCount
GetThreadContext
UnhandledExceptionFilter
TerminateProcess
LocalFree
WriteFile
ReadConsoleOutputA
InterlockedDecrement
EnterCriticalSection
FreeLibrary
GetTickCount
HeapReAlloc
GetVersionExA
FreeEnvironmentStringsA
QueryPerformanceCounter
CompareStringA
VirtualAllocEx
IsDebuggerPresent
CreateMutexA
GetACP
MultiByteToWideChar
WriteConsoleA
GetStringTypeW
InterlockedExchange
ReadFile
GetAtomNameA
ExpandEnvironmentStringsW
LCMapStringW
FlushFileBuffers
IsValidLocale
RtlUnwind
GetProcessHeap
GetThreadTimes
LCMapStringA
GetEnvironmentStrings
SetConsoleCtrlHandler
advapi32
LogonUserA
RegEnumValueA
GetUserNameW
LookupAccountNameW
CryptEnumProviderTypesA
CryptGetDefaultProviderA
RegCreateKeyExA
RegCreateKeyA
RegRestoreKeyW
Sections
.text Size: 157KB - Virtual size: 157KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 10KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 318KB - Virtual size: 318KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ