Behavioral task
behavioral1
Sample
bcddc41357ac4b21dc3278309158e8ba.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bcddc41357ac4b21dc3278309158e8ba.exe
Resource
win10v2004-20240226-en
General
-
Target
bcddc41357ac4b21dc3278309158e8ba.bin
-
Size
63KB
-
MD5
bcddc41357ac4b21dc3278309158e8ba
-
SHA1
de8975f727d5b494cb4e0402dcb2d120001fd753
-
SHA256
3a368701cce98ef505cc1529e129925c13ac15ffd0fb8333fc67e2098b45c19e
-
SHA512
1e063ebab5fe5acd6f449cca5b22365ebeacf23f0f62331ba65349de7563fecb4d3ac127222f546f08197dcc6188a0b3e6c10612ec7c8c7a5138ef17fd1255ef
-
SSDEEP
768:ZCyAqlTmQjEYiMisSZG3sEi9yRlsFCBSlVr1312x:fAqlTmQYYsYEM6ss1
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bcddc41357ac4b21dc3278309158e8ba.bin
Files
-
bcddc41357ac4b21dc3278309158e8ba.bin.exe windows:4 windows x86 arch:x86
bce456fcbc9b68b4340d711fc59bbd42
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
Process32Next
Process32First
CreateToolhelp32Snapshot
WriteFile
UnmapViewOfFile
TerminateProcess
SizeofResource
SetEndOfFile
OpenProcess
MoveFileExA
MapViewOfFile
LockResource
LoadResource
LoadLibraryA
GetSystemDirectoryA
GetProcAddress
GetFullPathNameA
GetCurrentThreadId
FreeResource
FreeLibrary
FindResourceA
FindFirstFileA
DeleteFileA
CreateProcessA
CreateFileMappingA
CreateFileA
CompareStringA
CloseHandle
TlsSetValue
TlsGetValue
LocalAlloc
GetModuleHandleA
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
InitializeCriticalSection
VirtualFree
VirtualAlloc
LocalFree
LocalAlloc
GetTickCount
QueryPerformanceCounter
GetVersion
GetCurrentThreadId
GetThreadLocale
GetStartupInfoA
GetModuleFileNameA
GetLocaleInfoA
GetCommandLineA
FreeLibrary
ExitProcess
WriteFile
UnhandledExceptionFilter
RtlUnwind
RaiseException
GetStdHandle
advapi32
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
user32
GetKeyboardType
MessageBoxA
CharNextA
GetWindowThreadProcessId
GetMessageA
FindWindowA
Sections
UPX0 Size: 60KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.avc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE