Static task
static1
Behavioral task
behavioral1
Sample
bd65ace3057f58b2c44da4686b09d958.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bd65ace3057f58b2c44da4686b09d958.exe
Resource
win10v2004-20240226-en
General
-
Target
bd65ace3057f58b2c44da4686b09d958
-
Size
158KB
-
MD5
bd65ace3057f58b2c44da4686b09d958
-
SHA1
add647cb7a108f5d26fae24f0a017b42a5c53684
-
SHA256
27f79f34161868506048bd55deeb8bb363b6ba49efa14bd6ad9eec970f256fe7
-
SHA512
4fed06f076783776672c46a8ecb7da4eccd3116744ffa0a59e14014a8dee02196da20a093a94ff784316f44d62b9553ad674a4897ebb19eb16fd3f52ffe2a96e
-
SSDEEP
3072:V8CK/v9AwNI87Fn6/lVr06N6gATq9frJk/P04G7:VWlA8OVY6NSiJk/P8
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bd65ace3057f58b2c44da4686b09d958
Files
-
bd65ace3057f58b2c44da4686b09d958.exe windows:4 windows x86 arch:x86
f433e7fcc51e68080022754836705744
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
LoadLibraryA
GetProcAddress
ExitProcess
VirtualAlloc
VirtualFree
user32
MessageBoxA
Sections
.text Size: - Virtual size: 84KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: - Virtual size: 412KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
xt.c650j Size: - Virtual size: 112KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
b6guzb.z Size: 156KB - Virtual size: 160KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
x30eh8k6 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ