Static task
static1
Behavioral task
behavioral1
Sample
beffa4dfa1d433a648a4e0d0b3ab9a5abcf6500b8c51e80f62995fb0c1187d27.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
beffa4dfa1d433a648a4e0d0b3ab9a5abcf6500b8c51e80f62995fb0c1187d27.exe
Resource
win10v2004-20240709-en
General
-
Target
beffa4dfa1d433a648a4e0d0b3ab9a5abcf6500b8c51e80f62995fb0c1187d27
-
Size
436KB
-
MD5
6c95a3029d8cb0c1514cda9f40f64f0b
-
SHA1
35c56f54bafbaca607d9ecbf6d4603d042dce141
-
SHA256
beffa4dfa1d433a648a4e0d0b3ab9a5abcf6500b8c51e80f62995fb0c1187d27
-
SHA512
291639ab670a30a34439c9221fdc87903a0788d10f7d053dda69ef614b7f28bbb6e09a7560e1f68a7072f291247f0abc3f34cba5c8a15d5b279f1df2ced1230e
-
SSDEEP
6144:X+iCG+BY64JanxwHq1KZe75QgQbpkirLauxyxPS5djYQuuMVCCke3nAsAJmfsm+k:L9zGXaPmD
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource beffa4dfa1d433a648a4e0d0b3ab9a5abcf6500b8c51e80f62995fb0c1187d27
Files
-
beffa4dfa1d433a648a4e0d0b3ab9a5abcf6500b8c51e80f62995fb0c1187d27.exe windows:4 windows x86 arch:x86
ef012e0f410ffa03eb0918e7a16663eb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
setupapi
SetupDiGetDeviceRegistryPropertyA
SetupDiEnumDeviceInfo
SetupDiGetClassDevsA
SetupDiGetDeviceInstanceIdA
SetupDiClassGuidsFromNameA
SetupDiGetINFClassA
SetupDiGetDeviceInstallParamsA
SetupDiCallClassInstaller
SetupDiEnumDriverInfoA
SetupDiBuildDriverInfoList
SetupDiSetDeviceInstallParamsA
SetupDiRegisterDeviceInfo
SetupDiSetDeviceRegistryPropertyA
SetupDiCreateDeviceInfoA
SetupDiCreateDeviceInfoList
SetupDiDestroyDriverInfoList
SetupDiSetSelectedDevice
SetupDiGetDriverInfoDetailA
SetupDiRemoveDevice
SetupDiDestroyDeviceInfoList
comctl32
ord17
shlwapi
PathAppendA
PathIsDirectoryA
kernel32
CreateProcessA
FindClose
FindNextFileA
SetLastError
FindFirstFileA
GetSystemDirectoryA
GetProcAddress
GetModuleHandleA
Sleep
GetModuleFileNameA
SetCurrentDirectoryA
GetFullPathNameA
DeleteFileA
SetFileAttributesA
GetFileAttributesA
GetVersionExA
GetComputerNameA
GetUserDefaultLangID
GetCurrentDirectoryA
GetWindowsDirectoryA
GetCurrentProcess
ReleaseMutex
CreateDirectoryA
MapViewOfFile
CreateFileMappingA
CreateMutexA
UnmapViewOfFile
GetTimeFormatA
GetLocalTime
OutputDebugStringA
MoveFileExA
LocalAlloc
GetCurrentThread
FreeLibrary
SetEnvironmentVariableA
Module32First
CreateToolhelp32Snapshot
Process32Next
Process32First
TerminateProcess
OpenProcess
CloseHandle
DeviceIoControl
CreateFileA
GetPrivateProfileStringA
WaitForSingleObject
GlobalUnlock
GlobalLock
GlobalAlloc
CopyFileA
GetCurrentProcessId
GetCurrentThreadId
RemoveDirectoryA
LoadLibraryA
WriteFile
SetFilePointer
DeleteCriticalSection
GetFileType
GetStdHandle
SetHandleCount
LeaveCriticalSection
EnterCriticalSection
RaiseException
LCMapStringW
WideCharToMultiByte
LCMapStringA
IsDebuggerPresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
TlsFree
TlsSetValue
TlsAlloc
TlsGetValue
IsValidCodePage
ReadFile
GetOEMCP
GetACP
InterlockedDecrement
InterlockedIncrement
GetCPInfo
GetStartupInfoA
WinExec
GetLastError
FormatMessageA
LocalFree
InitializeCriticalSection
GetConsoleCP
GetConsoleMode
GlobalFree
GetExitCodeProcess
FlushFileBuffers
HeapDestroy
HeapCreate
VirtualFree
VirtualAlloc
HeapReAlloc
HeapSize
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
MultiByteToWideChar
GetProcessHeap
HeapAlloc
GetCommandLineA
CompareStringW
CompareStringA
SetEndOfFile
SetStdHandle
RtlUnwind
HeapFree
ExitProcess
user32
EndDeferWindowPos
LoadImageA
UpdateWindow
MessageBoxA
LoadStringA
GetWindowRect
ShowWindow
DeferWindowPos
GetClientRect
GetSystemMetrics
SetWindowPos
SendMessageA
CopyRect
GetParent
CheckDlgButton
SetDlgItemTextA
GetDlgItem
EnableWindow
EndDialog
IsDlgButtonChecked
GetWindowThreadProcessId
EnumWindows
DialogBoxParamA
GetWindowInfo
ExitWindowsEx
CreateWindowExA
OffsetRect
GetDesktopWindow
BeginDeferWindowPos
LoadBitmapA
advapi32
RegEnumValueA
OpenSCManagerA
OpenServiceA
ControlService
QueryServiceStatus
DeleteService
CloseServiceHandle
ImpersonateSelf
OpenThreadToken
AllocateAndInitializeSid
InitializeSecurityDescriptor
GetLengthSid
InitializeAcl
AddAccessAllowedAce
SetSecurityDescriptorDacl
SetSecurityDescriptorGroup
SetSecurityDescriptorOwner
IsValidSecurityDescriptor
AccessCheck
RevertToSelf
FreeSid
RegDeleteValueA
RegEnumKeyExA
RegQueryInfoKeyA
RegDeleteKeyA
LookupPrivilegeValueA
OpenProcessToken
AdjustTokenPrivileges
RegSetValueExA
GetUserNameA
RegOpenKeyExA
RegQueryValueExA
RegCloseKey
RegCreateKeyExA
shell32
SHGetSpecialFolderPathA
SHGetFolderPathA
ole32
CoUninitialize
CoCreateInstance
CoInitialize
CoSetProxyBlanket
oleaut32
SysStringLen
SysFreeString
SysAllocStringLen
Sections
.text Size: 100KB - Virtual size: 96KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 36KB - Virtual size: 35KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 288KB - Virtual size: 320KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE