Static task
static1
Behavioral task
behavioral1
Sample
bec5ad1a848b0e4e6315e1d2b63c86a0.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bec5ad1a848b0e4e6315e1d2b63c86a0.exe
Resource
win10v2004-20240226-en
General
-
Target
bec5ad1a848b0e4e6315e1d2b63c86a0
-
Size
216KB
-
MD5
bec5ad1a848b0e4e6315e1d2b63c86a0
-
SHA1
f805ffb00c30547643bc8b7f19f962ccb34a086d
-
SHA256
33abe343605df5e05d783de800e150ddcffd03932460294fd154dacef1dfed11
-
SHA512
ee429d9229b5375e2a64019a3a43d2d66d69e0fa40d20f5ec03b6e95dc741d5c9ccbc819aad8c58fea64605cee5b3210087ca65a565bdb37ad7b54209ea7ece8
-
SSDEEP
6144:i6M96wgvRHCzOYtqlGyzcsX3KA0LQIQRku:3i3gNCpOdn/uI
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bec5ad1a848b0e4e6315e1d2b63c86a0
Files
-
bec5ad1a848b0e4e6315e1d2b63c86a0.exe windows:4 windows x86 arch:x86
ef39d474ee88b9215814d74ee695b02b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
HeapAlloc
GetProcessHeap
VirtualAlloc
VirtualProtect
VirtualFree
GetProcAddress
LoadLibraryA
IsBadReadPtr
HeapFree
FreeLibrary
HeapReAlloc
GetModuleHandleA
GetStartupInfoA
GetCommandLineA
GetVersion
ExitProcess
GetModuleFileNameA
GetEnvironmentVariableA
GetVersionExA
HeapDestroy
HeapCreate
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
WideCharToMultiByte
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetFileType
RtlUnwind
WriteFile
GetCPInfo
GetACP
GetOEMCP
MultiByteToWideChar
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
Sections
.text Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 160KB - Virtual size: 161KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ