Static task
static1
Behavioral task
behavioral1
Sample
bf049b6a681e44cf2634d8e6b9fe9367.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bf049b6a681e44cf2634d8e6b9fe9367.exe
Resource
win10v2004-20240226-en
General
-
Target
bf049b6a681e44cf2634d8e6b9fe9367
-
Size
201KB
-
MD5
bf049b6a681e44cf2634d8e6b9fe9367
-
SHA1
fba4cf050e60f34606be19ab8ae47fcb73758463
-
SHA256
d82fce7a1ad47c7fb51a5218bfa6a631d33b4015940c001d348983f6e1f4efad
-
SHA512
2206b4ff18886165b5d4a53287333a441f2e1ae9e236562f18d55238169ff4885df54182f6b63b596ba1d5b23d80641470bc89051e67e4337d77bfb71acfd924
-
SSDEEP
6144:1qJC5V2HImC6rpMDhREX46xzN8jDLbu0ewmP:1cC72/C6rpMDho46xxmDLbZeNP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bf049b6a681e44cf2634d8e6b9fe9367
Files
-
bf049b6a681e44cf2634d8e6b9fe9367.exe windows:4 windows x86 arch:x86
f8efb1c4ab4b2ddd48cb46d241b2a4dd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
gdi32
GetDCPenColor
GetDeviceCaps
GetGraphicsMode
GetPixelFormat
GetPolyFillMode
GetRandomRgn
GetSystemPaletteUse
GetTextAlign
GetTextCharacterExtra
GetTextCharset
SetSystemPaletteUse
UpdateColors
kernel32
CloseHandle
DeleteCriticalSection
DeleteFileA
EnterCriticalSection
ExitProcess
GetCommandLineA
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetLastError
GetModuleHandleA
GetProcAddress
GetStartupInfoA
GetVersion
GlobalAlloc
InitializeCriticalSection
InterlockedExchange
IsDBCSLeadByteEx
IsDebuggerPresent
IsProcessorFeaturePresent
LeaveCriticalSection
LocalFlags
LockResource
MoveFileA
MultiByteToWideChar
SetFilePointer
SetUnhandledExceptionFilter
SizeofResource
Sleep
TlsGetValue
VirtualProtect
VirtualQuery
WideCharToMultiByte
WriteFile
msvcrt
_gcvt
_getw
_itoa
_pclose
_strdup
_stricmp
_stricoll
_strlwr
_strnset
_strrev
_strset
__getmainargs
__mb_cur_max
__p__daylight
__p__environ
__p__fmode
__p__osver
__p__pgmptr
__p__winminor
__p__winver
__p__wpgmptr
__set_app_type
_cexit
_chgsign
_errno
_fdopen
_findclose
_findfirst
_findnext
_flsbuf
_flushall
_fpclass
_fputchar
_fullpath
_hypot
_iob
_isnan
_itoa
_itow
_localtime64
_logb
_ltoa
_ltow
_mktime64
_nextafter
_onexit
_pclose
_popen
_searchenv
_set_error_mode
_setmode
_stat64
_strset
_tempnam
_time64
_wcsdup
_wcslwr
_wctime64
_wfdopen
_wtol
abort
atexit
atoi
calloc
exit
fclose
fflush
fgetwc
fopen
fputc
fputs
fputwc
free
ftell
fwrite
fwscanf
getenv
gets
isspace
localeconv
malloc
mbstowcs
mbtowc
memcmp
memcpy
memmove
memset
rand
realloc
setbuf
setlocale
signal
sprintf
srand
strcat
strchr
strcmp
strcoll
strcpy
strftime
strlen
strncpy
strstr
strtok
strtol
swprintf
swscanf
tmpfile
tolower
vfprintf
wcslen
wcstombs
user32
CheckDlgButton
DrawTextA
EnableWindow
EndDialog
EndPaint
GetDC
GetDialogBaseUnits
GetDlgItem
GetDlgItemInt
GetForegroundWindow
GetInputState
GetMenu
GetMenuItemCount
GetMenuState
GetScrollPos
GetWindowContextHelpId
GetWindowDC
IsWindowEnabled
LoadIconA
RemovePropA
SetDlgItemTextA
SetFocus
ShowWindow
WindowFromDC
Sections
.text Size: 167KB - Virtual size: 167KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 48B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 20KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.eh_fram Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 298KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE