Static task
static1
Behavioral task
behavioral1
Sample
bb63ed34413a104d197c9e58c98f7b00N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
bb63ed34413a104d197c9e58c98f7b00N.exe
Resource
win10v2004-20240704-en
General
-
Target
bb63ed34413a104d197c9e58c98f7b00N.exe
-
Size
464KB
-
MD5
bb63ed34413a104d197c9e58c98f7b00
-
SHA1
51b297355c7d32b3557d33927554fea4071f270e
-
SHA256
ff1ca383bbe86ac0328cafbdac4aa2bffeb261f7ee17a2fd02260395f11031d8
-
SHA512
f7c91f13975051103ce4b370db22467a09dccc88f5bf3ad9730ac3935089e6572970861dd3e3ce20bb51db2fc1d8a19d2cb56b8c60b08a2bf9c848fa946826d1
-
SSDEEP
12288:Kc7UkQIbdse1B2+X97Z9+rnnPFqLFBGYzPzbM8x7DirB24DC+Au9dbR6C2JbWmmq:Ka2BcBx7HqDC+Au9xf8imr6t
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bb63ed34413a104d197c9e58c98f7b00N.exe
Files
-
bb63ed34413a104d197c9e58c98f7b00N.exe.exe windows:4 windows x86 arch:x86
9810ffcdf3e7b3dee7a585474d191dec
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comdlg32
ChooseFontA
ChooseColorA
GetOpenFileNameA
ChooseColorW
PrintDlgW
FindTextA
GetSaveFileNameA
PageSetupDlgA
GetSaveFileNameW
GetFileTitleA
PageSetupDlgW
PrintDlgA
user32
ChildWindowFromPointEx
GetCaretBlinkTime
gdi32
Polyline
SetWindowOrgEx
GetArcDirection
PlayMetaFileRecord
GetTextExtentPointW
SetWindowExtEx
wininet
SetUrlCacheConfigInfoA
ShowClientAuthCerts
RegisterUrlCacheNotification
InternetQueryDataAvailable
GetUrlCacheEntryInfoExW
FtpPutFileW
HttpQueryInfoA
FtpGetCurrentDirectoryA
UnlockUrlCacheEntryStream
GopherCreateLocatorW
InternetDial
InternetTimeFromSystemTimeW
InternetCombineUrlA
GopherGetLocatorTypeW
SetUrlCacheHeaderData
kernel32
SetHandleCount
LoadLibraryA
FileTimeToSystemTime
GetEnvironmentStringsW
GetSystemTimeAsFileTime
CompareStringA
GetVersionExA
GetTickCount
IsDebuggerPresent
GetCPInfo
LocalHandle
GetModuleFileNameA
GetProcAddress
FreeEnvironmentStringsA
GetStdHandle
GetStringTypeA
GetOEMCP
OpenMutexW
HeapCreate
InitializeCriticalSection
VirtualAlloc
SetLocaleInfoW
HeapReAlloc
GetProcessHeap
GetTimeFormatA
HeapDestroy
HeapSize
SetLastError
LCMapStringA
WideCharToMultiByte
GetStringTypeW
MultiByteToWideChar
IsValidLocale
GetLastError
ExitProcess
GetLocaleInfoW
SetConsoleCtrlHandler
PulseEvent
SetUnhandledExceptionFilter
TlsGetValue
TlsAlloc
UnhandledExceptionFilter
SetEnvironmentVariableA
TlsSetValue
VirtualFree
Sleep
GetTimeZoneInformation
GetStartupInfoA
GetUserDefaultLCID
GetCurrentThreadId
IsValidCodePage
GetDiskFreeSpaceA
EnumDateFormatsA
InterlockedDecrement
RtlUnwind
GetCommandLineA
DeleteCriticalSection
LeaveCriticalSection
CompareStringW
GetDateFormatA
CompareFileTime
FindAtomW
TlsFree
GetCurrentProcessId
WriteFile
GetCurrentThread
InterlockedIncrement
QueryPerformanceCounter
HeapFree
GetLocaleInfoA
GetEnvironmentStrings
GetFileType
EnumSystemLocalesA
LCMapStringW
InterlockedExchange
FreeEnvironmentStringsW
SetThreadPriority
ResumeThread
TerminateProcess
FreeLibrary
GetACP
HeapAlloc
GetModuleHandleA
HeapLock
VirtualQuery
EnterCriticalSection
GetCurrentProcess
Sections
.text Size: 141KB - Virtual size: 141KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 312KB - Virtual size: 311KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ