Static task
static1
Behavioral task
behavioral1
Sample
bdd314f96e40036bd6ec33fe8dd5f09e0f6a3e3bf8b6ef947c149fd8bab3903a.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
bdd314f96e40036bd6ec33fe8dd5f09e0f6a3e3bf8b6ef947c149fd8bab3903a.exe
Resource
win10v2004-20240226-en
General
-
Target
bdd314f96e40036bd6ec33fe8dd5f09e0f6a3e3bf8b6ef947c149fd8bab3903a
-
Size
427KB
-
MD5
7a5b17d3132a2175122a5bb5f11517a7
-
SHA1
8fa8baa18a434a06292501d05bd1b4581505cc80
-
SHA256
bdd314f96e40036bd6ec33fe8dd5f09e0f6a3e3bf8b6ef947c149fd8bab3903a
-
SHA512
29e5972c17ad5ebc36002b0f5145c11cf4a6c657d3103d1e8353c7260cd5cae6431a10bca945663cc8e134e6ecd6c2c6e645594c274190dad6e6064e85db3eda
-
SSDEEP
12288:kDfyadKneG7KOyqFUqxX3/i5Gum6c0FjGmKuqZNMRuDEOPKXsvdI/Oy0VvO:wfvOAXRuD18Ad2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bdd314f96e40036bd6ec33fe8dd5f09e0f6a3e3bf8b6ef947c149fd8bab3903a
Files
-
bdd314f96e40036bd6ec33fe8dd5f09e0f6a3e3bf8b6ef947c149fd8bab3903a.exe windows:5 windows x86 arch:x86
0969bd71d8bbd28af0f3ddf55c84e043
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
ReleaseMutex
CreateMutexA
GetModuleHandleA
GetModuleFileNameA
SetCurrentDirectoryW
GetProcAddress
SetEndOfFile
GetCurrentDirectoryW
GetFullPathNameW
SetEnvironmentVariableA
HeapSize
WriteConsoleW
LCMapStringW
CompareStringW
GetLastError
CreateFileW
OutputDebugStringW
SystemTimeToTzSpecificLocalTime
GetDriveTypeW
FindFirstFileExW
FindClose
SetStdHandle
GetModuleFileNameW
TerminateProcess
GetFileAttributesW
CopyFileW
Sleep
LoadLibraryW
CreateDirectoryW
FlushFileBuffers
RaiseException
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetModuleHandleW
InitializeCriticalSectionAndSpinCount
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetStartupInfoW
GetConsoleCP
ReadConsoleW
GetConsoleMode
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
WriteFile
GetCurrentProcess
CreateProcessW
GetStringTypeW
GetProcessHeap
FreeLibrary
FileTimeToSystemTime
GetFileInformationByHandle
FileTimeToLocalFileTime
SetFilePointerEx
InterlockedExchange
GetCurrentProcessId
GetCurrentThread
GetCurrentThreadId
GetThreadPriority
SetLastError
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
SetEvent
WaitForSingleObject
WaitForMultipleObjects
DuplicateHandle
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
CreateEventA
LoadLibraryA
GetTickCount
SleepEx
VerSetConditionMask
GetSystemDirectoryA
VerifyVersionInfoA
FormatMessageA
GetStdHandle
GetFileType
ReadFile
PeekNamedPipe
ExpandEnvironmentStringsA
MultiByteToWideChar
WideCharToMultiByte
HeapFree
HeapAlloc
GetSystemTimeAsFileTime
EncodePointer
DecodePointer
ExitProcess
GetModuleHandleExW
AreFileApisANSI
GetCommandLineA
RtlUnwind
CreateThread
ExitThread
LoadLibraryExW
GetTimeZoneInformation
HeapReAlloc
IsDebuggerPresent
IsProcessorFeaturePresent
advapi32
CryptEncrypt
CryptImportKey
CryptDestroyKey
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptGetHashParam
CryptGenRandom
CryptReleaseContext
CryptAcquireContextA
RegSetValueExW
RegCloseKey
RegCreateKeyExW
ws2_32
htonl
ioctlsocket
gethostname
listen
accept
ntohl
recvfrom
freeaddrinfo
getaddrinfo
WSAIoctl
setsockopt
ntohs
htons
getsockopt
getsockname
getpeername
connect
closesocket
bind
send
recv
select
__WSAFDIsSet
socket
WSACleanup
WSAStartup
WSAGetLastError
WSASetLastError
sendto
crypt32
CertFreeCertificateContext
wldap32
ord46
ord211
ord45
ord50
ord41
ord301
ord200
ord30
ord79
ord35
ord33
ord32
ord27
ord26
ord22
ord143
Sections
.text Size: 338KB - Virtual size: 338KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 64KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 15KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ