Static task
static1
Behavioral task
behavioral1
Sample
bce63c1f9c9cc567944326ea9bacd79d8be2213b94968b778414c04397c67c6e.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral2
Sample
bce63c1f9c9cc567944326ea9bacd79d8be2213b94968b778414c04397c67c6e.exe
Resource
win11-20240611-en
General
-
Target
bce63c1f9c9cc567944326ea9bacd79d8be2213b94968b778414c04397c67c6e
-
Size
611KB
-
MD5
a318fa5506a826bbc80f544d9eece852
-
SHA1
391d1f1d9d5ac6eeef9e0f4b30f53e8e7efc28f2
-
SHA256
bce63c1f9c9cc567944326ea9bacd79d8be2213b94968b778414c04397c67c6e
-
SHA512
4bdbcf7b57d0eca121310ba692fcce4d262e3c78284bec0c987a74bef9ec294d9db0a8532e8e537261c7f35e444d1946ef7d54a7dcf0fe2b2f8fbc2ada22d711
-
SSDEEP
12288:V9TyrBjn/9u1Xc77pkh3m7Gk+VOj/uVVh16+oWlBC0//:CrBjo1+7p23m7AAuVh1voWlBC03
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bce63c1f9c9cc567944326ea9bacd79d8be2213b94968b778414c04397c67c6e
Files
-
bce63c1f9c9cc567944326ea9bacd79d8be2213b94968b778414c04397c67c6e.exe windows:5 windows x86 arch:x86
038fd82a29b15c409ae8a61e434d0fd1
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryExW
GetComputerNameW
GetTickCount
GetNumberFormatA
GetWindowsDirectoryA
GetUserDefaultLangID
SetProcessPriorityBoost
TlsSetValue
GlobalAlloc
LoadLibraryW
AssignProcessToJobObject
GetACP
IsBadStringPtrA
OpenMutexW
GetLastError
SetLastError
GetProcAddress
BuildCommDCBW
LoadLibraryA
InterlockedExchangeAdd
GetDiskFreeSpaceA
FoldStringA
GetModuleFileNameA
FindFirstVolumeMountPointA
lstrcatW
OutputDebugStringA
WriteProcessMemory
HeapFree
HeapReAlloc
GetModuleHandleW
ExitProcess
DecodePointer
GetCommandLineW
HeapSetInformation
GetStartupInfoW
HeapAlloc
HeapCreate
EncodePointer
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TerminateProcess
GetCurrentProcess
TlsAlloc
TlsGetValue
TlsFree
InterlockedIncrement
GetCurrentThreadId
InterlockedDecrement
WriteFile
GetStdHandle
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetCurrentProcessId
GetSystemTimeAsFileTime
RtlUnwind
Sleep
WideCharToMultiByte
GetCPInfo
GetOEMCP
IsValidCodePage
HeapSize
RaiseException
IsProcessorFeaturePresent
LCMapStringW
MultiByteToWideChar
GetStringTypeW
Sections
.text Size: 427KB - Virtual size: 426KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 61KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 162KB - Virtual size: 162KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ