Static task
static1
Behavioral task
behavioral1
Sample
bd330a28dc45ea0520fa9a489823ce9d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bd330a28dc45ea0520fa9a489823ce9d.exe
Resource
win10v2004-20240226-en
General
-
Target
bd330a28dc45ea0520fa9a489823ce9d
-
Size
379KB
-
MD5
bd330a28dc45ea0520fa9a489823ce9d
-
SHA1
723c6787076f7171088e8c80e5969a8cd1c79af2
-
SHA256
4b10382be2b46de4d2562e6b578cfa3901dca897d4f9d155d7d269e45118ea59
-
SHA512
cafb776ef41b844fb45aa2702d7e56bd2bacb97a838485fe91a04f65f6b349e08fe531ac4d3ddf3970815a7b0b63cc01df08317f39f702efbc346e3fbc729a2e
-
SSDEEP
6144:kUrrW+hZt7gaX8lWG1Xandp29y7w6XcHzaZQ+1TI5SBrO1up6ONwqRKtevLa6c:RZtsaMxXyp29y7LXcHe1TeupB+qCoaz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bd330a28dc45ea0520fa9a489823ce9d
Files
-
bd330a28dc45ea0520fa9a489823ce9d.exe windows:4 windows x86 arch:x86
c8a4fc98f8a61590b8f149dd45482c8b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
shell32
InternalExtractIconListA
kernel32
GetUserDefaultLCID
DeleteCriticalSection
SetHandleCount
GetProcessHeap
CreateRemoteThread
GetVersionExA
GlobalUnfix
SleepEx
HeapCreate
HeapDestroy
LoadLibraryExA
GetStartupInfoA
WaitCommEvent
GetTickCount
GetLocaleInfoW
HeapReAlloc
SetStdHandle
FreeLibrary
GetOEMCP
GetLocaleInfoA
GetACP
LCMapStringW
GetEnvironmentStringsW
LeaveCriticalSection
GetConsoleMode
VirtualAlloc
VirtualFree
GetCurrentThread
QueryPerformanceCounter
TlsAlloc
HeapSize
WideCharToMultiByte
GetLastError
GetConsoleCP
HeapAlloc
CompareStringA
FindAtomW
UnhandledExceptionFilter
FreeEnvironmentStringsW
OpenMutexA
GetEnvironmentVariableW
TlsGetValue
GetTimeZoneInformation
EnterCriticalSection
GetStringTypeW
InterlockedExchange
TlsSetValue
GetCommandLineA
SetConsoleCtrlHandler
LoadLibraryA
GetCurrentProcessId
GetConsoleOutputCP
WriteConsoleA
GetCurrentProcess
GetDateFormatA
SetFilePointer
InterlockedDecrement
InterlockedIncrement
EnumSystemLocalesA
SetUnhandledExceptionFilter
WriteConsoleW
SetEnvironmentVariableA
GetNamedPipeHandleStateA
CreateMutexA
GetModuleHandleA
GlobalSize
TlsFree
GetEnvironmentStrings
GetCurrentThreadId
LCMapStringA
VirtualQuery
IsValidCodePage
GetTimeFormatA
CreateFileW
VirtualUnlock
ReadFile
GetFileType
GetTempPathW
WritePrivateProfileSectionW
InitializeCriticalSection
GetSystemTimeAsFileTime
CreateFileA
GetWindowsDirectoryA
ReleaseSemaphore
GetModuleFileNameA
SetLastError
IsDebuggerPresent
GetStringTypeA
ExitProcess
FreeEnvironmentStringsA
CloseHandle
IsValidLocale
GetCPInfo
GetProcAddress
CompareStringW
MultiByteToWideChar
WriteFile
RtlUnwind
Sleep
GetStdHandle
TerminateProcess
HeapFree
LockFileEx
FlushFileBuffers
comctl32
InitCommonControlsEx
ImageList_EndDrag
CreateToolbarEx
DrawStatusText
user32
GetClassWord
CreateWindowExA
SetDoubleClickTime
PeekMessageA
MessageBoxW
DrawTextExA
RegisterClassA
SendMessageTimeoutA
ShowWindow
TabbedTextOutA
MenuItemFromPoint
SetWindowTextA
GetMenuInfo
SetMenuInfo
IsWindowVisible
RegisterClassExA
gdi32
GetTextExtentExPointW
FloodFill
CreatePolyPolygonRgn
ScaleViewportExtEx
CreateScalableFontResourceW
GetRandomRgn
GetEnhMetaFileHeader
SetStretchBltMode
GetEnhMetaFileW
GetFontLanguageInfo
LineDDA
advapi32
RegOpenKeyA
CryptDeriveKey
CryptDuplicateKey
RegNotifyChangeKeyValue
CryptEnumProvidersW
RegEnumValueW
CryptImportKey
CryptSetProviderW
RegSetKeySecurity
CreateServiceW
CryptAcquireContextA
RegQueryMultipleValuesW
RegSaveKeyA
AbortSystemShutdownA
CryptSetKeyParam
LookupSecurityDescriptorPartsA
CryptSignHashA
LookupPrivilegeValueA
LookupPrivilegeNameW
RegDeleteKeyW
RegSetValueW
CryptGetKeyParam
Sections
.text Size: 229KB - Virtual size: 228KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 37KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 90KB - Virtual size: 89KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 22KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ