Static task
static1
Behavioral task
behavioral1
Sample
bcaa96ebd2cd239bf12fbe493729d7a6.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
bcaa96ebd2cd239bf12fbe493729d7a6.exe
Resource
win10v2004-20240226-en
General
-
Target
bcaa96ebd2cd239bf12fbe493729d7a6
-
Size
161KB
-
MD5
bcaa96ebd2cd239bf12fbe493729d7a6
-
SHA1
bb109681904597a9a5ebe1eb856a13cdfa92bd37
-
SHA256
e690e227d37e93366f1b23c639b7b2c3ce6642a3d9912a79f395c54031ac03fa
-
SHA512
ecebb6cc645d0ff2d155f7762c07e3af5eab4fd16c98455c6784738909ea5eeaf08f250fffac16d80182f7843a7a454465f74814f99709b78876c89b76697956
-
SSDEEP
3072:C3qfI+LiDNeyNY1NiUdWJ65+xWM1WWEofJJyf039d90qJvzkWfjNBolha:C3gMeyQiBRWG2fYd90qJvz3hua
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bcaa96ebd2cd239bf12fbe493729d7a6
Files
-
bcaa96ebd2cd239bf12fbe493729d7a6.exe windows:4 windows x86 arch:x86
e018b47ec4112fe43143687374f887fd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ord17
kernel32
GetEnvironmentVariableA
MulDiv
GlobalUnlock
GlobalLock
GetModuleFileNameA
FreeLibrary
LoadLibraryExA
IsDBCSLeadByte
SetLastError
GlobalFree
GlobalHandle
CreateDirectoryA
GetCommandLineA
GetProcAddress
LoadLibraryA
GetShortPathNameA
GetWindowsDirectoryA
ReadFile
CreateEventA
GetSystemInfo
SetFilePointer
GetTempPathA
LocalFree
GetTickCount
GetCurrentProcessId
GetSystemDirectoryA
GetUserDefaultLangID
MoveFileA
ExitProcess
LocalAlloc
FormatMessageA
GetFileAttributesA
SetEndOfFile
UnmapViewOfFile
MapViewOfFile
CreateFileMappingA
GetFileSize
MoveFileExA
TerminateProcess
OpenProcess
CompareStringW
Process32First
CreateToolhelp32Snapshot
ResetEvent
CreateThread
SetStdHandle
FlushFileBuffers
LCMapStringW
LCMapStringA
GetStringTypeW
GetStringTypeA
IsBadCodePtr
IsBadReadPtr
QueryPerformanceCounter
GetFileType
SetHandleCount
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetStdHandle
GetTimeZoneInformation
GetCPInfo
GetOEMCP
HeapSize
TlsGetValue
TlsSetValue
TlsFree
TlsAlloc
SetUnhandledExceptionFilter
IsBadWritePtr
VirtualFree
HeapCreate
HeapDestroy
GetStartupInfoA
GetSystemTimeAsFileTime
HeapReAlloc
RtlUnwind
VirtualQuery
VirtualAlloc
VirtualProtect
CompareStringA
GetCurrentThreadId
InterlockedDecrement
InterlockedIncrement
GetModuleHandleA
DeleteFileA
CreateProcessA
GetExitCodeProcess
CreateFileA
WriteFile
CloseHandle
lstrcmpA
lstrcpynA
lstrcatA
lstrlenA
lstrlenW
lstrcpyA
lstrcmpiA
GlobalAlloc
WaitForSingleObject
SetEnvironmentVariableA
HeapAlloc
GetProcessHeap
HeapFree
GetCurrentProcess
FlushInstructionCache
FindResourceA
LoadResource
LockResource
SizeofResource
DeleteCriticalSection
InitializeCriticalSection
LeaveCriticalSection
EnterCriticalSection
GetLastError
RaiseException
WideCharToMultiByte
MultiByteToWideChar
GetVersionExA
GetThreadLocale
GetLocaleInfoA
GetACP
InterlockedExchange
Process32Next
user32
LoadBitmapA
EndDialog
EnableWindow
MessageBoxA
GetActiveWindow
CreateDialogIndirectParamA
DialogBoxIndirectParamA
RegisterWindowMessageA
GetWindowTextLengthA
GetWindowTextA
SetWindowTextA
RegisterClassExA
GetClassInfoExA
LoadCursorA
GetDlgCtrlID
SetWindowContextHelpId
MapDialogRect
PostMessageA
GetWindowThreadProcessId
EnumWindows
PeekMessageA
DispatchMessageA
DispatchMessageW
TranslateMessage
GetMessageA
GetMessageW
IsWindowUnicode
MsgWaitForMultipleObjects
SetWindowLongA
GetWindowLongA
CheckDlgButton
IsDlgButtonChecked
SetCursor
PtInRect
GetWindowRect
GetCursorPos
ShowWindow
IsWindowVisible
GetSystemMenu
LoadImageA
EnableMenuItem
DestroyWindow
UnregisterClassA
wsprintfA
LoadStringA
DefWindowProcA
GetSysColor
ReleaseCapture
SetCapture
FillRect
GetClientRect
GetDC
SetForegroundWindow
ReleaseDC
InvalidateRect
InvalidateRgn
GetDesktopWindow
CallWindowProcA
EndPaint
BeginPaint
SetFocus
GetWindow
IsChild
GetFocus
DestroyAcceleratorTable
SendMessageA
IsWindow
GetDlgItem
RedrawWindow
SetWindowPos
GetClassNameA
GetParent
CharNextA
CreateAcceleratorTableA
CreateWindowExA
gdi32
SetBkColor
SetTextColor
CreateDIBSection
SetBkMode
StretchBlt
SaveDC
SetGraphicsMode
ModifyWorldTransform
SetViewportOrgEx
SetWindowOrgEx
DeleteObject
SelectObject
DeleteDC
CreateCompatibleBitmap
CreateCompatibleDC
BitBlt
GetDeviceCaps
GetObjectA
GetStockObject
CreateSolidBrush
RestoreDC
CreateFontIndirectA
SetDIBColorTable
DPtoLP
advapi32
RegOpenKeyExA
RegOpenKeyA
CryptAcquireContextA
CryptCreateHash
CryptReleaseContext
CryptHashData
CryptGetHashParam
CryptDestroyHash
RegEnumKeyA
RegSetValueExA
RegEnumKeyExA
RegQueryInfoKeyA
RegDeleteValueA
RegCreateKeyExA
RegDeleteKeyA
RegQueryValueExA
RegCloseKey
shell32
ShellExecuteA
SHGetFolderLocation
SHBrowseForFolderA
SHGetPathFromIDListA
SHGetFolderPathA
ole32
CoCreateInstance
OleUninitialize
OleInitialize
CoTaskMemRealloc
CoTaskMemFree
CLSIDFromString
CLSIDFromProgID
CoGetClassObject
CreateStreamOnHGlobal
OleLockRunning
CoTaskMemAlloc
StringFromGUID2
oleaut32
VarUI4FromStr
LoadTypeLi
LoadRegTypeLi
VariantInit
VariantClear
OleCreateFontIndirect
SysStringByteLen
SysStringLen
SysFreeString
SysAllocString
SysAllocStringLen
urlmon
URLDownloadToFileA
version
VerQueryValueA
GetFileVersionInfoA
wininet
InternetOpenA
InternetCloseHandle
InternetReadFile
HttpQueryInfoA
HttpSendRequestA
HttpOpenRequestA
InternetConnectA
InternetCrackUrlA
InternetErrorDlg
gdiplus
GdipDisposeImage
GdipDeleteGraphics
GdipGetImageWidth
GdipGetImageHeight
GdipGetImagePixelFormat
GdipGetImagePaletteSize
GdipGetImagePalette
GdipCreateBitmapFromFile
GdipCreateBitmapFromFileICM
GdipCreateBitmapFromScan0
GdipBitmapLockBits
GdipBitmapUnlockBits
GdiplusStartup
GdipFree
GdipGetImageGraphicsContext
GdiplusShutdown
GdipCloneImage
GdipAlloc
GdipDrawImageI
Sections
.text Size: 116KB - Virtual size: 114KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 15.8MB - Virtual size: 15.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ