Static task
static1
Behavioral task
behavioral1
Sample
bd8be83f2b1d45c19473d1990cd55c63.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bd8be83f2b1d45c19473d1990cd55c63.exe
Resource
win10v2004-20240226-en
General
-
Target
bd8be83f2b1d45c19473d1990cd55c63
-
Size
111KB
-
MD5
bd8be83f2b1d45c19473d1990cd55c63
-
SHA1
9abc185f942b94c8faa4436944ea900a48dd70fe
-
SHA256
5b8e0da38d1e09c956856083a0176a2789d44effa1bce33bd6cfb31d3763da7a
-
SHA512
522c2b9540535be50cefa42d16cd8441e77d56fee8a0528af363e00bf1b2519c682560b5203bec2060c484b3436537ccaf2cfa12e868be72f8ae02a80ff0d72d
-
SSDEEP
3072:FVXeZwQE1wypvtw7guUBQRs+nhl91hyHaGVQVrS:ruuQEekFADRPnhl91hy6GiA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bd8be83f2b1d45c19473d1990cd55c63
Files
-
bd8be83f2b1d45c19473d1990cd55c63.exe windows:4 windows x86 arch:x86
d6811e7c54697effaadd4a63b2392bd3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
GetProcAddress
VirtualAlloc
VirtualFree
shlwapi
PathFileExistsA
user32
RegisterClipboardFormatA
gdi32
SetMapMode
comdlg32
GetFileTitleA
winspool.drv
OpenPrinterA
advapi32
RegQueryValueExA
shell32
SHGetSpecialFolderPathA
comctl32
ord17
oledlg
ord8
ole32
CoRevokeClassObject
olepro32
ord253
oleaut32
SysStringLen
wininet
InternetCrackUrlA
ws2_32
getprotobyname
Sections
.text Size: 101KB - Virtual size: 268KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE