Static task
static1
Behavioral task
behavioral1
Sample
bc66e3bb86ea4f0444f2424579bbc9be.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
bc66e3bb86ea4f0444f2424579bbc9be.exe
Resource
win10v2004-20240226-en
General
-
Target
bc66e3bb86ea4f0444f2424579bbc9be
-
Size
396KB
-
MD5
bc66e3bb86ea4f0444f2424579bbc9be
-
SHA1
97d1e638b7aca8afd4730816548cc79096823024
-
SHA256
40943a2d87651aeb3f83e9395f3226bb648d56d359c1d5784fc0f81f564c3d2d
-
SHA512
e33767f52db5742dae3715e4723caadd19ca1e1634f68cf961e741f025f7cbf9980323901204eb318464711849d55799f8078dfae5af57c47d7ba15414e5dcc6
-
SSDEEP
12288:gGncgJwYik+H7fVXIuUZ4bk9nmQrRl3+a9:gGcj7fFVUZ4bk9n5rjL9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bc66e3bb86ea4f0444f2424579bbc9be
Files
-
bc66e3bb86ea4f0444f2424579bbc9be.exe windows:4 windows x86 arch:x86
b8a3260c5bb945652db8aab05eb8e152
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualProtect
Sleep
GetProcAddress
CloseHandle
GetFileSize
CreateMutexA
ReadFile
CreateFileA
LocalAlloc
GlobalFree
WriteFile
GlobalAlloc
UnlockFile
LockFile
SetFilePointer
CreateEventA
SystemTimeToFileTime
GetSystemTime
FindClose
FindNextFileA
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
FindResourceExA
GetACP
GetCPInfo
HeapReAlloc
HeapAlloc
RtlUnwind
HeapCreate
HeapDestroy
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
GetModuleFileNameA
UnhandledExceptionFilter
GetCurrentProcess
GetStringTypeW
TerminateProcess
HeapFree
ExitProcess
GetVersion
GetCommandLineA
GetStartupInfoA
VirtualFreeEx
FreeLibrary
CreateSemaphoreA
LoadLibraryA
GetTempPathA
CopyFileA
VirtualAlloc
GetLastError
GetSystemDirectoryA
GetModuleHandleA
GetOEMCP
VirtualFree
user32
GetIconInfo
GetMessageA
TranslateAcceleratorA
ReleaseDC
ShowCaret
HideCaret
GetDC
TranslateMessage
DispatchMessageA
GetDesktopWindow
IsWindow
IsWindowVisible
SetWindowRgn
DrawIcon
DestroyIcon
CreateIconIndirect
EndDialog
DialogBoxParamA
DestroyWindow
DefWindowProcA
BeginPaint
GetClientRect
DrawTextA
EndPaint
PostQuitMessage
CreateWindowExA
ShowWindow
UpdateWindow
LoadIconA
LoadCursorA
RegisterClassExA
LoadStringA
LoadAcceleratorsA
CopyImage
gdi32
CreateDCA
CreateSolidBrush
SelectObject
Rectangle
DeleteObject
GetCharWidth32A
TextOutA
EnumObjects
GetObjectA
GetDIBits
CreatePen
pdh
PdhAddCounterA
PdhCollectQueryData
PdhOpenQueryA
Sections
.text Size: 160KB - Virtual size: 158KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 576KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bosevl Size: 184KB - Virtual size: 184KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.vvls Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.msl Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ