Static task
static1
Behavioral task
behavioral1
Sample
bef3997f75826fe72f03bc69ba4c8687.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bef3997f75826fe72f03bc69ba4c8687.exe
Resource
win10v2004-20240226-en
General
-
Target
bef3997f75826fe72f03bc69ba4c8687
-
Size
63KB
-
MD5
bef3997f75826fe72f03bc69ba4c8687
-
SHA1
79218484afd04a9553d28e41ae73bf539ab396dd
-
SHA256
43c90985c95e3b884db646faffab9a170121592bee7b64c4438246c8db519f25
-
SHA512
175194a08e494ba07eb0853cfbaea1c71c7c3d1df61a663d29e032f182d241cb1e2b28062826a4970c0cd3172ce4d1bd4066aa622e0454ad7d3d95f6278fec3b
-
SSDEEP
1536:7nHsGnCqarm2euXqdddddddddddddddddddddddddddddddddddddddddddddddE:LMGnTvQXNJNdj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bef3997f75826fe72f03bc69ba4c8687
Files
-
bef3997f75826fe72f03bc69ba4c8687.exe windows:4 windows x86 arch:x86
3f3ad6165d4735a58f98c0ee207b2ae1
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetLastError
IsBadStringPtrW
lstrlen
HeapCreate
PulseEvent
FindClose
TlsGetValue
CloseHandle
CreateFileA
GetACP
TerminateThread
GetModuleHandleA
GetEnvironmentVariableA
Sleep
CreateMutexA
ReleaseMutex
LoadLibraryW
GlobalUnlock
LocalFree
FindResourceA
user32
SetFocus
GetDlgItem
CopyRect
CallWindowProcA
DefWindowProcW
GetDC
GetIconInfo
FillRect
DrawMenuBar
DispatchMessageA
CheckRadioButton
DrawEdge
IsWindow
msasn1
ASN1BERDecNull
ASN1BEREncBool
ASN1BERDecBool
ASN1BEREncEoid
ASN1BERDecCheck
dpnet
DirectPlay8Create
Sections
.text Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1024B - Virtual size: 522B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 54KB - Virtual size: 82KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE