Static task
static1
Behavioral task
behavioral1
Sample
bffe910904efd1f69544daa9b72f2a70fb29f73c51070bde4ea563de862ce4b1.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
bffe910904efd1f69544daa9b72f2a70fb29f73c51070bde4ea563de862ce4b1.exe
Resource
win10v2004-20240226-en
General
-
Target
bffe910904efd1f69544daa9b72f2a70fb29f73c51070bde4ea563de862ce4b1
-
Size
312KB
-
MD5
76c3d2092737d964dfd627f1ced0af80
-
SHA1
61d1a5b8f242706a39d06316e4c66b01141b4ab3
-
SHA256
bffe910904efd1f69544daa9b72f2a70fb29f73c51070bde4ea563de862ce4b1
-
SHA512
c8aa123dcb460840971b5a7116332d135314c297e1f8b7cfbdc93299e2bcf12399161f43d769f72695d045eaf688b653c9524b38f70748558d570f1fb9c74860
-
SSDEEP
6144:aaWSGcJtPRms8/MhGNxd5Ga029ofRhg1yw0ITvuad31G6rdDb:aaWId/8UYZGa02m5hov0IT/R1zdDb
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bffe910904efd1f69544daa9b72f2a70fb29f73c51070bde4ea563de862ce4b1
Files
-
bffe910904efd1f69544daa9b72f2a70fb29f73c51070bde4ea563de862ce4b1.exe windows:6 windows x64 arch:x64
94ac5eb93a473b2681b66cd3e8ec3c36
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
CreateFileW
WriteConsoleW
SetFilePointerEx
GetConsoleMode
GetConsoleCP
FlushFileBuffers
LoadLibraryA
HeapSize
GetProcessHeap
GetStringTypeW
GetFileType
SetStdHandle
LCMapStringW
GetModuleHandleW
GetLastError
GetTempPathW
CloseHandle
HeapReAlloc
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
IsValidCodePage
FindNextFileW
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
RtlCaptureContext
RtlLookupFunctionEntry
RtlVirtualUnwind
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
GetStartupInfoW
IsProcessorFeaturePresent
LocalFree
RtlPcToFileHeader
EncodePointer
RaiseException
GetModuleFileNameW
RtlUnwindEx
SetLastError
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
GetCurrentProcess
TerminateProcess
GetStdHandle
WriteFile
MultiByteToWideChar
WideCharToMultiByte
ExitProcess
GetModuleHandleExW
GetACP
HeapFree
HeapAlloc
FindClose
FindFirstFileExW
GetTickCount
user32
GetWindow
GetWindowRect
GetWindowTextW
GetDC
GetCursor
DispatchMessageW
LoadCursorA
GetForegroundWindow
GetClientRect
KillTimer
GetSysColorBrush
GetCursorPos
gdi32
GetStockObject
GetFontLanguageInfo
GetSystemPaletteEntries
GetFontUnicodeRanges
CreatePen
GetFontData
mscoree
CLRCreateInstance
oleaut32
SafeArrayUnaccessData
SafeArrayCreate
SafeArrayCreateVector
SafeArrayAccessData
advapi32
SystemFunction036
Sections
.text Size: 52KB - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 212KB - Virtual size: 211KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ