Static task
static1
Behavioral task
behavioral1
Sample
bbeb779b3a6e1071ec24263794f5133f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bbeb779b3a6e1071ec24263794f5133f.exe
Resource
win10v2004-20240226-en
General
-
Target
bbeb779b3a6e1071ec24263794f5133f
-
Size
101KB
-
MD5
bbeb779b3a6e1071ec24263794f5133f
-
SHA1
6fd3b0dec6f5058da1baf6d4cbf02c049dc522ea
-
SHA256
3a7412d645f081cd917a5eabfd433f99ee2a5d21d9d3743c73ac5157ab70a517
-
SHA512
bd21fc4dd23823660dc65a4af485e23dcbd57fb369e044e4f3778b1076f4b18b6a6ab10e9ad26bb1bb2e98865fb155416fbfd21f544228dcf3ddfa013d0e842c
-
SSDEEP
3072:K8EOi3T16ddJhbw7QeXjktL4WDkDTkKw:GOieWQeXjktLNDkXk1
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bbeb779b3a6e1071ec24263794f5133f
Files
-
bbeb779b3a6e1071ec24263794f5133f.exe windows:4 windows x86 arch:x86
1e49ce18207f76060e458df221fb5f7c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvcrt
_cexit
_acmdln
__p__commode
_XcptFilter
__setusermatherr
_except_handler3
_write
_adjust_fdiv
strcmp
memset
_initterm
free
__getmainargs
__p__fmode
fputs
exit
strchr
printf
_exit
__p__environ
__set_app_type
calloc
kernel32
ExpandEnvironmentStringsA
SetUnhandledExceptionFilter
GetModuleHandleW
LoadLibraryExW
GetProcAddress
VirtualProtectEx
DeleteFileA
comctl32
ImageList_Write
ImageList_SetOverlayImage
InitCommonControlsEx
ImageList_GetBkColor
ImageList_DrawEx
ImageList_Read
CreateStatusWindowA
ImageList_Remove
gdi32
EndPage
CreateEllipticRgn
GetTextExtentPoint32A
ole32
ReleaseStgMedium
CoRevokeClassObject
OleUninitialize
OleSetMenuDescriptor
DoDragDrop
CoUninitialize
CoReleaseMarshalData
oleaut32
SafeArrayPutElement
SysAllocStringLen
advapi32
RegDeleteValueW
InitializeSecurityDescriptor
RegFlushKey
RegEnumKeyExA
OpenThreadToken
SetSecurityDescriptorOwner
user32
IsWindow
GetTopWindow
CallWindowProcA
TrackPopupMenu
InvalidateRect
AdjustWindowRectEx
GetWindowLongA
GetSystemMenu
SetForegroundWindow
GetWindowThreadProcessId
PeekMessageA
shell32
SHFileOperationW
Sections
.text Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 38KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 57KB - Virtual size: 56KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ