Static task
static1
Behavioral task
behavioral1
Sample
bdce06771f8cdab6c365a36b923c91b3.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bdce06771f8cdab6c365a36b923c91b3.exe
Resource
win10v2004-20240226-en
General
-
Target
bdce06771f8cdab6c365a36b923c91b3
-
Size
48KB
-
MD5
bdce06771f8cdab6c365a36b923c91b3
-
SHA1
60b2836630203733a54921374787c36541b36217
-
SHA256
d5dbffc122a57a1936857c2c540f7fa49cf2b7fa5ac2c56b09ad62dd9a22e67b
-
SHA512
0c27d0d11f8c3f2dbdaaf74e193aa0ab9c2ce8e42949db8fd9f028b7a7e6f635facae0f2b54c03630253964089ece418e563de46cc3545f25d511cd4073bacc2
-
SSDEEP
768:Fd+vdHu24/evKkA3l+sdc/d0WBU57MPsg/cTcn:X+lOZ/QKkElxO/2Wy5qb
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bdce06771f8cdab6c365a36b923c91b3
Files
-
bdce06771f8cdab6c365a36b923c91b3.exe windows:4 windows x86 arch:x86
e4e848b4d16617b632860e662e459c05
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GlobalFree
ReleaseMutex
DeviceIoControl
CreateFileA
lstrcmpA
lstrcpyA
OpenMutexA
lstrlenA
GlobalAlloc
GetModuleHandleA
GetStartupInfoA
GetEnvironmentStrings
GetCommandLineA
GetVersion
RegisterServiceProcess
CloseHandle
UnhandledExceptionFilter
GetModuleFileNameA
GetACP
GetOEMCP
GetCPInfo
ord122
GetFileType
VirtualFree
VirtualAlloc
MultiByteToWideChar
WideCharToMultiByte
GetProcAddress
GetLastError
CreateMutexA
ExitProcess
RtlUnwind
GetStdHandle
user32
MessageBoxA
KillTimer
SetTimer
PostQuitMessage
DefWindowProcA
RegisterClassA
CreateWindowExA
GetMessageA
TranslateMessage
DispatchMessageA
advapi32
RegOpenKeyA
RegQueryValueExA
RegCloseKey
Sections
.text Size: 32KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 4KB - Virtual size: 904B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ