Static task
static1
Behavioral task
behavioral1
Sample
bde35b4b56fbf9a68aaa877bf6c8447081148547b11e55ab589e0d68543ea0d7.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bde35b4b56fbf9a68aaa877bf6c8447081148547b11e55ab589e0d68543ea0d7.exe
Resource
win10v2004-20240508-en
General
-
Target
bde35b4b56fbf9a68aaa877bf6c8447081148547b11e55ab589e0d68543ea0d7
-
Size
14.0MB
-
MD5
bddcd1a63ddd5ec567628d86a888e0ed
-
SHA1
2ddc05fd6c5318dea179637bf5ab4fc9a55314c6
-
SHA256
bde35b4b56fbf9a68aaa877bf6c8447081148547b11e55ab589e0d68543ea0d7
-
SHA512
4e7c77b4dd9225af50649cac97fa16caadb63f96abb4df0560142b7ff3641b6704a5d9a50874f7b4611426fa0ad75fe6db2503aefe6ff1b3d8123c33f8c90ffc
-
SSDEEP
196608:6lisPV6f6QBYl6tf/1YgrfwcMf9mcrJcJsv6tWKFdu9CYQd6VDQAyQF/YT:6QqQ7YgrYXDaJsv6tWKFdu9CJ6V8A/U
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bde35b4b56fbf9a68aaa877bf6c8447081148547b11e55ab589e0d68543ea0d7
Files
-
bde35b4b56fbf9a68aaa877bf6c8447081148547b11e55ab589e0d68543ea0d7.exe windows:5 windows x86 arch:x86
36f8785a81c16bcf477716065e27dd0f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
MapViewOfFile
UnmapViewOfFile
MoveFileExW
GetCurrentDirectoryW
CreateDirectoryW
DeleteFileW
FindClose
FindFirstFileW
GetFileAttributesW
GetFileAttributesExW
GetFileInformationByHandle
GetFullPathNameW
GetLongPathNameW
RemoveDirectoryW
GetTempPathW
DeviceIoControl
CopyFileW
MoveFileW
SystemTimeToTzSpecificLocalTime
FileTimeToSystemTime
GetEnvironmentStringsW
FreeEnvironmentStringsW
GetStdHandle
SetFilePointer
ConnectNamedPipe
CreateNamedPipeW
GetExitCodeProcess
MultiByteToWideChar
WideCharToMultiByte
FindFirstFileExW
FindNextFileW
ReadFileEx
PeekNamedPipe
CancelIo
SleepEx
GetModuleHandleA
WriteFileEx
FreeLibrary
GetModuleHandleExW
GetTimeZoneInformation
GetGeoInfoW
GetUserGeoID
ExitProcess
DisconnectNamedPipe
WaitNamedPipeW
GetOverlappedResult
SetHandleInformation
CreateFileMappingW
lstrcmpW
GetVolumeInformationW
GetDriveTypeW
EncodePointer
DecodePointer
RaiseException
RtlUnwind
GetCommandLineA
HeapFree
HeapAlloc
HeapReAlloc
IsDebuggerPresent
IsProcessorFeaturePresent
AreFileApisANSI
EnterCriticalSection
LeaveCriticalSection
ExitThread
LoadLibraryExW
SetStdHandle
SetFileAttributesW
GetConsoleMode
ReadConsoleW
GetConsoleCP
HeapSize
SetLastError
GetProcessHeap
DeleteCriticalSection
GetModuleFileNameA
GetSystemTimeAsFileTime
UnhandledExceptionFilter
InitializeCriticalSectionAndSpinCount
IsValidCodePage
GetACP
GetOEMCP
GetCPInfo
SetEnvironmentVariableA
WriteConsoleW
LCMapStringW
EnumSystemLocalesW
GetStringTypeW
CreateMutexW
ReleaseMutex
InitializeCriticalSection
SetErrorMode
WriteFile
SetEndOfFile
SetFilePointerEx
ReadFile
GetLogicalDrives
GetFileType
FlushFileBuffers
CreateFileW
GetTickCount
QueryPerformanceFrequency
QueryPerformanceCounter
GetStartupInfoW
GetModuleFileNameW
GetUserDefaultUILanguage
GetCurrencyFormatW
GetTimeFormatW
GetDateFormatW
ResetEvent
LoadLibraryW
GetSystemDirectoryW
WaitForSingleObjectEx
WaitForMultipleObjects
GetSystemInfo
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
TerminateThread
GetThreadPriority
SetThreadPriority
GetCurrentThread
CreateThread
SwitchToThread
Sleep
CreateEventW
WaitForSingleObject
SetEvent
DuplicateHandle
GetLocalTime
GetSystemTime
GetConsoleWindow
OutputDebugStringW
GetCommandLineW
GetUserDefaultLCID
CompareStringW
FindNextChangeNotification
GetCurrentProcessId
GlobalSize
LoadLibraryA
GetLocaleInfoW
GlobalUnlock
GlobalLock
GlobalAlloc
OpenProcess
CheckRemoteDebuggerPresent
GetUserDefaultLangID
ExpandEnvironmentStringsW
IsValidLocale
FormatMessageW
IsValidLanguageGroup
LocalFree
GetCurrentThreadId
GetLastError
VirtualAlloc
VirtualFree
FindCloseChangeNotification
FindFirstChangeNotificationW
GetVolumeInformationA
CreateProcessW
GetModuleHandleW
lstrlenW
CloseHandle
ResumeThread
SuspendThread
SetThreadContext
GetThreadContext
WriteProcessMemory
VirtualProtectEx
FlushInstructionCache
GetProcAddress
SetUnhandledExceptionFilter
TerminateProcess
GetCurrentProcess
user32
DrawIconEx
MessageBoxW
CharNextExA
PostThreadMessageW
CallNextHookEx
UnhookWindowsHookEx
SetWindowsHookExW
KillTimer
FindWindowA
SetTimer
MsgWaitForMultipleObjectsEx
GetDoubleClickTime
MessageBeep
GetCaretBlinkTime
GetDesktopWindow
SystemParametersInfoW
SendMessageW
PostMessageW
GetQueueStatus
DefWindowProcW
CreateWindowExW
IsChild
DestroyWindow
ShowWindow
FlashWindowEx
MoveWindow
SetWindowPos
CreateIconIndirect
CreateCursor
LoadCursorW
GetCursor
SetCursorPos
NotifyWinEvent
SetMenuItemInfoW
TrackPopupMenuEx
GetMenu
MapVirtualKeyW
ToUnicode
ToAscii
GetKeyboardState
GetKeyState
IsZoomed
PeekMessageW
SetCaretPos
HideCaret
DestroyCaret
CreateCaret
RegisterWindowMessageW
GetKeyboardLayout
GetAsyncKeyState
RegisterClipboardFormatW
ChangeClipboardChain
GetWindowPlacement
DispatchMessageW
TranslateMessage
RealGetWindowClassW
EnumWindows
GetWindowTextW
GetMessageExtraInfo
TrackMouseEvent
GetClipboardFormatNameW
RegisterClassW
GetCursorInfo
AttachThreadInput
GetIconInfo
SetWindowPlacement
IsWindowVisible
IsIconic
SetFocus
GetCapture
GetKeyboardLayoutList
SetCapture
ReleaseCapture
GetSystemMetrics
GetSystemMenu
EnableMenuItem
GetForegroundWindow
SetForegroundWindow
GetDC
ReleaseDC
BeginPaint
EndPaint
GetUpdateRect
SetWindowRgn
SetClipboardViewer
LoadIconW
GetSysColor
EnumDisplayMonitors
GetMonitorInfoW
LoadImageW
GetSysColorBrush
ChildWindowFromPointEx
GetCursorPos
GetClientRect
GetFocus
RegisterClassExW
GetClassInfoW
UnregisterClassW
GetAncestor
DestroyIcon
DestroyCursor
GetWindowThreadProcessId
SetParent
GetParent
SetWindowLongW
GetWindowLongW
ScreenToClient
ClientToScreen
SetCursor
AdjustWindowRectEx
GetWindowRect
SetWindowTextW
InvalidateRect
netapi32
Netbios
shell32
SHGetSpecialFolderPathW
CommandLineToArgvW
SHBrowseForFolderW
SHGetPathFromIDListW
SHGetMalloc
ShellExecuteW
SHGetFileInfoW
Shell_NotifyIconW
ole32
CoTaskMemAlloc
CoGetMalloc
ReleaseStgMedium
CoTaskMemFree
DoDragDrop
CoCreateInstance
StringFromGUID2
OleIsCurrentClipboard
OleFlushClipboard
OleGetClipboard
OleSetClipboard
CoCreateGuid
CoInitialize
OleUninitialize
OleInitialize
RevokeDragDrop
RegisterDragDrop
CoLockObjectExternal
CoUninitialize
advapi32
RegCloseKey
RegQueryValueExW
OpenProcessToken
CopySid
FreeSid
GetLengthSid
GetTokenInformation
RegCreateKeyExW
RegDeleteKeyW
RegDeleteValueW
RegEnumKeyExW
RegEnumValueW
RegFlushKey
RegQueryInfoKeyW
RegSetValueExW
AddAccessAllowedAce
AllocateAndInitializeSid
InitializeAcl
InitializeSecurityDescriptor
SetSecurityDescriptorDacl
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
RegOpenKeyExW
ws2_32
WSASendTo
WSASend
WSARecvFrom
WSARecv
WSANtohs
WSANtohl
WSAIoctl
WSAHtonl
WSAConnect
WSAAccept
setsockopt
listen
htons
getsockname
WSASocketW
closesocket
bind
__WSAFDIsSet
WSAGetLastError
gethostbyname
gethostbyaddr
ntohl
inet_addr
getsockopt
htonl
WSAAsyncSelect
WSACleanup
WSAStartup
gethostname
getpeername
select
gdi32
BitBlt
CreateRectRgn
DeleteObject
OffsetRgn
GetDeviceCaps
CreateCompatibleBitmap
CreateCompatibleDC
CreateDCW
DeleteDC
SelectObject
EnumFontFamiliesExW
CreateFontIndirectW
GetFontData
GetStockObject
AddFontResourceExW
RemoveFontResourceExW
AddFontMemResourceEx
RemoveFontMemResourceEx
GetTextMetricsW
GetObjectW
GetTextFaceW
ChoosePixelFormat
DescribePixelFormat
GetPixelFormat
SetPixelFormat
SwapBuffers
CreateDIBSection
GdiFlush
GetBitmapBits
GetCharABCWidthsW
GetCharABCWidthsFloatW
GetGlyphOutlineW
GetOutlineTextMetricsW
GetTextExtentPoint32W
GetCharABCWidthsI
SetBkMode
SetGraphicsMode
SetTextColor
SetTextAlign
SetWorldTransform
ExtTextOutW
CreateBitmap
GetDIBits
GetRegionData
SelectClipRgn
CombineRgn
oleaut32
SysStringLen
VariantInit
VariantChangeType
SystemTimeToVariantTime
SysFreeString
SysAllocStringLen
SysAllocString
imm32
ImmGetDefaultIMEWnd
ImmReleaseContext
ImmAssociateContext
ImmGetCompositionStringW
ImmNotifyIME
ImmSetCompositionWindow
ImmSetCandidateWindow
ImmGetVirtualKey
ImmGetContext
winmm
PlaySoundW
iphlpapi
GetAdaptersAddresses
GetAdaptersInfo
Sections
.text Size: 6.8MB - Virtual size: 6.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4.6MB - Virtual size: 4.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 55KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.qtmetad Size: 512B - Virtual size: 272B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 292B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 18KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 223KB - Virtual size: 223KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ