Static task
static1
Behavioral task
behavioral1
Sample
bda54b7105acd4a7c81df5259d1c452d0a7d24831d8a1c357ef32404f4b1cd4a.exe
Resource
win7-20240729-en
General
-
Target
bda54b7105acd4a7c81df5259d1c452d0a7d24831d8a1c357ef32404f4b1cd4a
-
Size
2.0MB
-
MD5
5908865b3e2540951b86ae94f07ebed3
-
SHA1
97f532bcccb03c11f19d7e3fc0835e3bac6b7874
-
SHA256
bda54b7105acd4a7c81df5259d1c452d0a7d24831d8a1c357ef32404f4b1cd4a
-
SHA512
57ef0b833d397e34791143e72cedc1763fca96fc8cbf14f7e2ddb944d232d4e818afc1ecad78d1cc5c8049fa77528121288c8e4294853df775d088c666c9e70e
-
SSDEEP
49152:vVAbwuGwKOco09gsJcxlV8fTguPOAItUIrhO5Ov:tApQx5+Mc27g9tfoMv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bda54b7105acd4a7c81df5259d1c452d0a7d24831d8a1c357ef32404f4b1cd4a
Files
-
bda54b7105acd4a7c81df5259d1c452d0a7d24831d8a1c357ef32404f4b1cd4a.exe windows:6 windows x86 arch:x86
e59d00b0d90522ee1a983f13d4ff7e50
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualFree
VirtualAlloc
GetVersion
IsProcessorFeaturePresent
GetSystemDirectoryW
GetProcAddress
GetModuleHandleW
LoadLibraryExW
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
ReleaseSemaphore
InitializeCriticalSection
WaitForSingleObject
CreateEventW
GetLastError
SetEvent
CloseHandle
ResetEvent
CreateSemaphoreW
MultiByteToWideChar
WideCharToMultiByte
FreeLibrary
GetModuleFileNameW
FormatMessageW
LocalFree
CreateFileW
SetFileTime
SetFileAttributesW
RemoveDirectoryW
CreateDirectoryW
DeleteFileW
SetLastError
SetCurrentDirectoryW
GetCurrentDirectoryW
GetTempPathW
GetTickCount
GetCurrentThreadId
GetCurrentProcessId
GetFileInformationByHandle
FindClose
FindFirstFileW
FindNextFileW
GetModuleHandleA
GetFileAttributesW
GetFileSize
SetFilePointer
ReadFile
WriteFile
SetEndOfFile
GetCurrentProcess
GetProcessAffinityMask
GetSystemInfo
GlobalMemoryStatus
GetStdHandle
Sleep
GetVersionExW
GetCommandLineW
CreateProcessW
GetExitCodeProcess
HeapSize
SetStdHandle
GetProcessHeap
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineA
GetOEMCP
GetACP
IsValidCodePage
ReadConsoleW
GetConsoleMode
GetConsoleOutputCP
FlushFileBuffers
SetFilePointerEx
GetFileSizeEx
GetFileType
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
GetLocaleInfoW
LCMapStringW
HeapAlloc
HeapFree
HeapReAlloc
ExitProcess
GetModuleHandleExW
WriteConsoleW
FreeLibraryAndExitThread
ExitThread
CreateThread
TlsFree
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsDebuggerPresent
GetStartupInfoW
QueryPerformanceCounter
GetSystemTimeAsFileTime
InitializeSListHead
FormatMessageA
QueryPerformanceFrequency
GetLocaleInfoEx
FindFirstFileExW
AreFileApisANSI
InitializeCriticalSectionEx
EncodePointer
DecodePointer
LCMapStringEx
GetStringTypeW
GetCPInfo
RtlUnwind
RaiseException
InitializeCriticalSectionAndSpinCount
TlsAlloc
TlsGetValue
TlsSetValue
user32
LoadIconW
EndDialog
KillTimer
SetTimer
DestroyWindow
SendMessageW
SetWindowTextW
MessageBoxW
PostMessageW
LoadStringW
DialogBoxParamW
GetDlgItem
GetWindowLongW
SetWindowLongW
ShowWindow
CharUpperW
shell32
ShellExecuteExW
oleaut32
VariantClear
SysStringLen
SysAllocStringLen
Sections
.text Size: 232KB - Virtual size: 232KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 58KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ