Static task
static1
Behavioral task
behavioral1
Sample
bda7773c1dd3bce09e08fd2fb1be4332.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bda7773c1dd3bce09e08fd2fb1be4332.exe
Resource
win10v2004-20240226-en
General
-
Target
bda7773c1dd3bce09e08fd2fb1be4332
-
Size
568KB
-
MD5
bda7773c1dd3bce09e08fd2fb1be4332
-
SHA1
f2e8055051f571db1d7359cdaa1e5361901955b6
-
SHA256
36de7ff4e59834e87ac068aef2d4c8495f7465329c26a257d20c01ff85726927
-
SHA512
49cb71dab4b7659aaa332a48083b4110bcab37fcf22173cdc68e75f2bcb33baa1fdc55c3c88ed4d367e3458b006a79f4ed694f79645612db64e883e6014510c7
-
SSDEEP
6144:QZdwFsMgmJv8TCBNXwa4FQ1bpo4HT69jG:QPwFsMaOBNrHfoIT
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bda7773c1dd3bce09e08fd2fb1be4332
Files
-
bda7773c1dd3bce09e08fd2fb1be4332.exe windows:5 windows x86 arch:x86
6dbee8e15e33b0c00ad137df9d316b24
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
user32
DialogBoxParamA
psapi
GetModuleFileNameExA
kernel32
GetFileType
SetEnvironmentVariableA
CompareStringW
GetModuleHandleA
GetLastError
GetThreadContext
GetCurrentThread
LockResource
LoadResource
FindResourceA
WriteProcessMemory
VirtualProtectEx
GetCurrentProcess
WaitForSingleObject
CreateThread
VirtualAlloc
GetProcAddress
LoadLibraryA
IsBadReadPtr
HeapFree
HeapAlloc
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
FindFirstFileExA
GetCommandLineA
HeapSetInformation
GetStartupInfoW
EncodePointer
DecodePointer
RaiseException
IsProcessorFeaturePresent
HeapCreate
GetModuleHandleW
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameW
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
CloseHandle
EnterCriticalSection
LeaveCriticalSection
MultiByteToWideChar
ReadFile
InitializeCriticalSectionAndSpinCount
RtlUnwind
GetFullPathNameA
GetFileInformationByHandle
PeekNamedPipe
CreateFileA
GetCurrentDirectoryW
GetModuleFileNameA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStringsW
SetHandleCount
DeleteCriticalSection
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
Sleep
HeapSize
LoadLibraryW
SetStdHandle
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetFilePointer
GetDriveTypeW
SetEndOfFile
GetProcessHeap
GetTimeZoneInformation
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringW
HeapReAlloc
WriteConsoleW
GetStringTypeW
CreateFileW
Sections
.text Size: 50KB - Virtual size: 49KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 495KB - Virtual size: 494KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ