Static task
static1
Behavioral task
behavioral1
Sample
BYPASS.exe
Resource
win10v2004-20240802-en
General
-
Target
BYPASS.exe
-
Size
2.1MB
-
MD5
e5fbcaea2ee32bc97bb275f8ab726f1c
-
SHA1
80c644164d361a786e2587365233c1e46a34505f
-
SHA256
c85e4e0b9ba688d8aab0aa36ee4fac8bf8ddd2e9c6ca59a1b9dd5f18e7042193
-
SHA512
f9554776ef5c1b370ad2352ceceee37ea2223ffb4f02d8f60579d62290ac7f4b175d6f4c35838b9fe20ad00e84ed07152055b714d1a69c3d33a273d59620083d
-
SSDEEP
24576:x0PRyGhhLaQkLCyik4g1hQGIM1TUbesZ/yBMdXreEDYMQetn8GYMDDpkvkm+0AN9:wBnfkmyik4CdzsZKMxeE2e2G1vl7XN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource BYPASS.exe
Files
-
BYPASS.exe.exe windows:6 windows x64 arch:x64
baa93d47220682c04d92f7797d9224ce
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
lstrcpy
comctl32
InitCommonControls
Sections
Size: 72KB - Virtual size: 272KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 488B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 3.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ehkaqjdo Size: 2.0MB - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
wutmxrjx Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ