Static task
static1
Behavioral task
behavioral1
Sample
bb97157fefccda0c0d11ec396d6a0993c450d04c7f057593f0bbf0354e292014.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bb97157fefccda0c0d11ec396d6a0993c450d04c7f057593f0bbf0354e292014.exe
Resource
win10v2004-20240226-en
General
-
Target
bb97157fefccda0c0d11ec396d6a0993c450d04c7f057593f0bbf0354e292014
-
Size
204KB
-
MD5
a2e39ab6777f7b33178cf662958e2d9c
-
SHA1
bb195154c9b17e003dcb7a742ae5f8f8785a718b
-
SHA256
bb97157fefccda0c0d11ec396d6a0993c450d04c7f057593f0bbf0354e292014
-
SHA512
56bcd0dc09aa0e3217dba77d36b8af6a65a11fb683c215ec381e8708969b236675fa75c44a8db7f272732327251891c817e6ba0f2fa4be73abb5c4a74e926668
-
SSDEEP
3072:0AG2liPf8IQdcfH0k47bw8MLyh1qYZd8p7BTEkhFwY6WZF43mt5FSGCH:ticIQU547bw1La1ZZUB4kbw6ZJz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bb97157fefccda0c0d11ec396d6a0993c450d04c7f057593f0bbf0354e292014
Files
-
bb97157fefccda0c0d11ec396d6a0993c450d04c7f057593f0bbf0354e292014.exe windows:5 windows x86 arch:x86
59b6f6100771ef26866736f0a35d25d7
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
gdi32
DeleteObject
GetStockObject
CreateSolidBrush
ole32
CoInitializeEx
CoUninitialize
user32
SendMessageW
IsWindow
UpdateWindow
DestroyIcon
DefWindowProcW
DispatchMessageW
CreateWindowExW
GetSystemMetrics
EndPaint
DestroyWindow
GetWindowRect
GetMessageW
FillRect
GetParent
LoadCursorW
GetClientRect
BeginPaint
GetClassInfoExW
TranslateMessage
RegisterClassExW
LoadIconW
LoadMenuW
GetWindowLongW
SystemParametersInfoW
GetDlgItem
SetWindowLongW
GetSysColor
SetWindowPos
ShowWindow
advapi32
RegOpenKeyExW
RegCloseKey
RegQueryValueExW
shell32
SHGetMalloc
SHGetPathFromIDListW
SHBrowseForFolderW
SHGetSpecialFolderLocation
version
VerQueryValueW
GetFileVersionInfoSizeW
GetFileVersionInfoW
kernel32
WriteConsoleA
SetStdHandle
CreateFileW
InitializeCriticalSectionAndSpinCount
GetSystemTimeAsFileTime
GetCurrentProcessId
GetTickCount
QueryPerformanceCounter
GetCommandLineW
GetEnvironmentStringsW
FreeEnvironmentStringsW
LCMapStringW
LCMapStringA
IsValidCodePage
GetConsoleOutputCP
WriteConsoleW
FlushFileBuffers
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
GetOEMCP
GetACP
GetCPInfo
GetStartupInfoA
GetFileType
SetHandleCount
GetConsoleMode
GetConsoleCP
GetStdHandle
ExitProcess
VirtualAlloc
EnterCriticalSection
FindFirstFileW
CreateDirectoryW
CopyFileW
GetModuleFileNameW
FindClose
RemoveDirectoryW
FindNextFileW
DeleteFileW
CreateProcessW
WaitForSingleObject
GetVersionExW
CloseHandle
GetFileAttributesW
Sleep
MultiByteToWideChar
WideCharToMultiByte
GetFileSize
CreateFileA
GetVersionExA
GetFileAttributesA
FreeLibrary
GetProcAddress
LoadLibraryA
CreateDirectoryA
GetEnvironmentVariableA
MoveFileA
DeleteFileA
SetFileAttributesA
GetWindowsDirectoryA
GetModuleFileNameA
HeapFree
HeapAlloc
GetProcessHeap
GetLastError
lstrlenA
ReadFile
SetFilePointer
WriteFile
UnmapViewOfFile
CopyFileA
GetTempFileNameA
GetTempPathA
MapViewOfFile
CreateFileMappingA
ExpandEnvironmentStringsA
HeapSize
HeapReAlloc
GetModuleHandleA
SetEndOfFile
GetModuleHandleW
LeaveCriticalSection
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetStartupInfoW
RaiseException
RtlUnwind
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapCreate
VirtualFree
DeleteCriticalSection
comdlg32
CommDlgExtendedError
comctl32
InitCommonControlsEx
Sections
.text Size: 145KB - Virtual size: 145KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
O���u� Size: 16KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE