Static task
static1
Behavioral task
behavioral1
Sample
bf3bcec7958ebed04b55b7c07a3b3e3c.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
bf3bcec7958ebed04b55b7c07a3b3e3c.exe
Resource
win10v2004-20231215-en
General
-
Target
bf3bcec7958ebed04b55b7c07a3b3e3c
-
Size
182KB
-
MD5
bf3bcec7958ebed04b55b7c07a3b3e3c
-
SHA1
9203124d08ce95fbd978227a445fde0d9c6db9bc
-
SHA256
f016d4c8c1c13ce1849a45ed954a72158b0f7fe80329762b977866a533d05243
-
SHA512
991f3e6d0ab65a9e7d126e19ad3d652acf8c22048e114c1831596d7230d2a38f94d42d0c65a8dd7f730c2fc7dcf393295c4d61d69c3e97317454dc7a1c1f7068
-
SSDEEP
3072:JvCvdeqIHwYoHT1IBgjj0Mx70QSDcJwi+YsS57PQovAdsbpSBZAR5yLVF9r:JvCIqIQYA1IBgjj0MxcUvsS5bqdsbp54
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bf3bcec7958ebed04b55b7c07a3b3e3c
Files
-
bf3bcec7958ebed04b55b7c07a3b3e3c.exe windows:4 windows x86 arch:x86
9b591716e1afb7738230f6db92f72342
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CreateThread
EnterCriticalSection
FindFirstFileW
FindResourceW
GetFileAttributesW
GetFileSize
GetLocalTime
GetTickCount
IsBadCodePtr
OpenProcess
SystemTimeToFileTime
WriteFile
user32
EnableMenuItem
GetCursorPos
GetKeyState
GetSubMenu
GetWindowThreadProcessId
IsWindow
IsWindowEnabled
KillTimer
LoadStringA
PostMessageA
ReleaseDC
SetWindowPos
ShowWindow
gdi32
CreateDIBitmap
ExtTextOutW
GetDCOrgEx
GetTextExtentPoint32W
GetTextExtentPointA
MoveToEx
OffsetViewportOrgEx
SaveDC
shell32
SHAddToRecentDocs
SHFileOperationW
comctl32
ImageList_Create
ImageList_GetIconSize
Sections
.text Size: 73KB - Virtual size: 73KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 83KB - Virtual size: 83KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 22KB - Virtual size: 140KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ