Static task
static1
Behavioral task
behavioral1
Sample
bf86c607086e7c26ab85841434a77fca.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bf86c607086e7c26ab85841434a77fca.exe
Resource
win10v2004-20240226-en
General
-
Target
bf86c607086e7c26ab85841434a77fca
-
Size
292KB
-
MD5
bf86c607086e7c26ab85841434a77fca
-
SHA1
6389a774fb526af4a8c4c81b1d465678318906c2
-
SHA256
5a56f7e0bb5c4e94b631a775c8f542e7e283a01b5ca5747c30d288746abd6e48
-
SHA512
008fc10b8c40d4eca78b4eb1dace546fc58357f9a82247e167bc79b6456ece94de0b25bf1e69e789fadcdc4abe04690bc0c63e1518ef047dfd78d425a1a3de4a
-
SSDEEP
6144:4Cq8r0XGn7nXgcv278Y60qPH/qv8fN/9lS5GOd3LoDO3D:28JDfq+fnfN/qMOd3L
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bf86c607086e7c26ab85841434a77fca
Files
-
bf86c607086e7c26ab85841434a77fca.exe windows:4 windows x86 arch:x86
8f17b00090c72e886eb7c76e3df34d5a
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLocaleInfoA
GetVolumePathNameA
GetConsoleWindow
Toolhelp32ReadProcessMemory
GetWriteWatch
FlushFileBuffers
GetTickCount
PeekConsoleInputA
GetVolumeNameForVolumeMountPointA
GlobalUnfix
GetVersionExA
PurgeComm
GetProcessPriorityBoost
SetConsoleHardwareState
OpenWaitableTimerA
GetDiskFreeSpaceExA
SetThreadLocale
OpenEventA
ReleaseSemaphore
SizeofResource
OpenFile
FindResourceExA
RegisterWaitForSingleObjectEx
_lread
EnumSystemLocalesA
ReadConsoleA
DefineDosDeviceA
GetCommandLineA
SetThreadExecutionState
GetExpandedNameA
GetStartupInfoA
WriteFileGather
VirtualAllocEx
SetupComm
ReadFile
GetConsoleAliasA
IsBadCodePtr
ReadConsoleOutputCharacterA
WinExec
lstrcpyA
ExitProcess
AllocConsole
FormatMessageA
ProcessIdToSessionId
GetDevicePowerState
FindNextVolumeMountPointA
CloseHandle
lstrcmpi
SetThreadIdealProcessor
GetDriveTypeA
IsProcessorFeaturePresent
RemoveDirectoryA
GetConsoleOutputCP
WriteConsoleOutputA
WriteProcessMemory
GetPrivateProfileStructA
GlobalSize
ReadConsoleOutputCharacterA
FileTimeToSystemTime
GetTapePosition
OpenJobObjectA
OpenSemaphoreA
SetConsoleTitleA
ShowConsoleCursor
SetVolumeMountPointA
CopyFileExA
SetConsoleCursor
IsValidCodePage
GetUserDefaultLangID
HeapDestroy
OpenFileMappingA
AddConsoleAliasA
SetConsoleActiveScreenBuffer
GetDllDirectoryA
GetPrivateProfileStringA
GetLongPathNameA
ExpandEnvironmentStringsA
SetProcessPriorityBoost
GetExitCodeProcess
ReleaseMutex
_hwrite
lstrcpy
VerifyVersionInfoA
GetConsoleOutputCP
GetTempPathA
GetFileAttributesExA
OpenMutexA
SetConsoleMode
GetCommState
GetSystemTimes
OpenEventA
GetUserDefaultUILanguage
GetProcessHeaps
TransmitCommChar
SetEnvironmentVariableA
SetThreadContext
VirtualProtectEx
PurgeComm
GetWindowsDirectoryA
GetConsoleCommandHistoryA
GetExpandedNameA
Module32First
IsProcessorFeaturePresent
OpenFileMappingA
VirtualProtectEx
SetComputerNameExW
OpenJobObjectA
EnumSystemLanguageGroupsA
GetVolumeInformationA
GetUserDefaultLCID
GetFileAttributesExA
QueryMemoryResourceNotification
SetConsoleTextAttribute
WideCharToMultiByte
GetExitCodeThread
ClearCommError
IsValidCodePage
WriteConsoleOutputAttribute
GetProcessWorkingSetSize
GetShortPathNameA
GetCommandLineA
EscapeCommFunction
GetProcessHeap
GetVolumeInformationA
GetTickCount
GetConsoleAliasesLengthW
GetVolumeInformationA
GetWindowsDirectoryA
WriteConsoleInputA
_lwrite
CommConfigDialogA
MoveFileWithProgressA
GlobalSize
LoadModule
DeleteTimerQueue
HeapFree
WriteConsoleOutputA
lstrcmp
WriteConsoleInputA
SetSystemTime
GetCurrentDirectoryA
GetPrivateProfileSectionNamesA
OpenFileMappingA
GetConsoleCommandHistoryA
OpenSemaphoreA
ShowConsoleCursor
DeleteTimerQueueEx
IsBadStringPtrA
GetVersionExA
WriteProfileSectionA
GetConsoleFontInfo
FillConsoleOutputCharacterA
GetFileType
GetProcessShutdownParameters
SetEndOfFile
ReadConsoleInputA
MoveFileA
GetLogicalDrives
OpenFileMappingA
LockFileEx
RaiseException
GetProcessWorkingSetSize
GetDiskFreeSpaceA
CreateSemaphoreA
GetFileAttributesA
EndUpdateResourceA
UnregisterWait
GetNamedPipeInfo
GetModuleHandleA
GetProcessWorkingSetSize
GetProfileSectionA
RemoveDirectoryA
WriteConsoleOutputCharacterW
GetStringTypeExA
GetSystemRegistryQuota
SetSystemTime
GetNumberFormatA
SetStdHandle
GetCurrentDirectoryA
GetCommandLineA
user32
DialogBoxParamA
EnumDesktopsA
SetCaretBlinkTime
CharNextExA
SetClassLongA
CreateIconFromResource
IsCharUpperA
GetUpdateRgn
MapVirtualKeyExA
ExcludeUpdateRgn
SendMessageCallbackA
UnhookWindowsHookEx
GetReasonTitleFromReasonCode
SetClassLongA
EnumPropsExW
RealGetWindowClass
IsServerSideWindow
RegisterServicesProcess
GetWindowInfo
GetMenuContextHelpId
DefDlgProcA
GetMenuStringA
GetMenuContextHelpId
IsWindowUnicode
UnregisterDeviceNotification
EnableMenuItem
GrayStringA
CharLowerBuffA
SendMessageTimeoutA
GetKeyboardLayout
SetPropA
PostMessageA
RegisterUserApiHook
EndDeferWindowPos
SetPropA
UpdateLayeredWindow
SwitchDesktop
GetDoubleClickTime
GetAncestor
MessageBoxTimeoutA
UnhookWindowsHookEx
CharLowerBuffW
GetClipboardFormatNameA
LockSetForegroundWindow
CopyImage
GetScrollPos
DestroyIcon
IsClipboardFormatAvailable
GetDlgItemInt
BeginPaint
DialogBoxIndirectParamAorW
EqualRect
CharNextExA
GetClassWord
ReleaseDC
GetWindowModuleFileNameA
GetTaskmanWindow
IsZoomed
EnumClipboardFormats
GetWindowDC
InvalidateRect
PostThreadMessageA
GetMenuItemID
GetWindowTextA
GetKBCodePage
DrawCaptionTempA
DrawFocusRect
GetMonitorInfoA
DisableProcessWindowsGhosting
UpdateLayeredWindow
GetMonitorInfoA
SetWindowLongA
AllowSetForegroundWindow
CreateIconFromResource
SetScrollRange
RemoveMenu
SetWindowTextA
TrackPopupMenuEx
RegisterHotKey
LoadAcceleratorsA
SetWindowsHookExW
DialogBoxIndirectParamAorW
LoadCursorFromFileW
DrawTextA
GetMenuItemCount
SetSystemMenu
GetUserObjectInformationA
MessageBoxExA
EnableScrollBar
advapi32
IsValidSid
Sections
.itext Size: - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.text Size: 184KB - Virtual size: 515KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 96KB - Virtual size: 93KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ