Static task
static1
Behavioral task
behavioral1
Sample
Triggerb0t.exe
Resource
win11-20240802-en
General
-
Target
Triggerb0t.exe
-
Size
310KB
-
MD5
fb5aef5497d90d7d19b18651b581f8d1
-
SHA1
5aa63652c21f99570c802f1457114a7595bcb846
-
SHA256
cfa0623d5244c5f098695ce5d94f40aca995c0ef1c288290e4899683069d4b82
-
SHA512
7f337f028b93cbd5acf69bfd380f5bc9c72884473f86e6b1afe8e7d13ec521e21b7663557d271dbf83c8285d57651aa45acbad5c71ffa41b67768e9429717ae7
-
SSDEEP
3072:5eGedn8O+kuW7dMBeyut5Ox0YEZAl/fLaTSk/f6ZMRln3VDs5X/eFAReHfotwz07:gx8HyMBi5OyYEHX6Zus510L
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Triggerb0t.exe
Files
-
Triggerb0t.exe.exe windows:6 windows x64 arch:x64
c861f20d466d5d62a37d035cf3046d8c
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
bcrypt
BCryptGenRandom
advapi32
SystemFunction036
user32
GetWindowTextW
GetWindowTextLengthW
MapVirtualKeyW
VkKeyScanW
SendInput
GetForegroundWindow
RedrawWindow
CreateWindowExW
GetRawInputData
RegisterClassExW
ValidateRect
RegisterRawInputDevices
DestroyWindow
DefWindowProcW
GetAsyncKeyState
GetWindowLongPtrW
SetWindowLongPtrW
RegisterWindowMessageA
AdjustWindowRectEx
GetMenu
GetWindowLongW
MonitorFromPoint
InvalidateRgn
SetWindowPos
GetMonitorInfoW
kernel32
GetCurrentThreadId
SetConsoleTitleW
ReleaseSRWLockExclusive
AcquireSRWLockExclusive
InitializeSListHead
IsDebuggerPresent
UnhandledExceptionFilter
SetUnhandledExceptionFilter
HeapFree
GetProcessHeap
GetProcAddress
GetLastError
CreateMutexA
WaitForSingleObjectEx
GetSystemTimeAsFileTime
GetCurrentThread
ReadConsoleW
WideCharToMultiByte
MultiByteToWideChar
HeapAlloc
FormatMessageW
WaitForSingleObject
CloseHandle
LoadLibraryA
GetModuleHandleW
Sleep
GetModuleHandleA
GetStdHandle
SetConsoleMode
GetConsoleMode
CreateFileW
GetConsoleScreenBufferInfo
SetConsoleScreenBufferSize
SetConsoleWindowInfo
GetLargestConsoleWindowSize
WriteConsoleW
AddVectoredExceptionHandler
SetThreadStackGuarantee
SwitchToThread
CreateWaitableTimerExW
SetWaitableTimer
QueryPerformanceCounter
RtlCaptureContext
RtlVirtualUnwind
RtlLookupFunctionEntry
SetLastError
GetCurrentDirectoryW
GetEnvironmentVariableW
GetCurrentProcess
ReleaseMutex
GetCurrentProcessId
ReleaseSRWLockShared
AcquireSRWLockShared
TryAcquireSRWLockExclusive
QueryPerformanceFrequency
HeapReAlloc
IsProcessorFeaturePresent
dxgi
CreateDXGIFactory1
d3d11
D3D11CreateDevice
ntdll
NtWriteFile
NtReadFile
RtlNtStatusToDosError
vcruntime140
__CxxFrameHandler3
memmove
memcmp
memcpy
memset
_CxxThrowException
__C_specific_handler
__current_exception_context
__current_exception
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-runtime-l1-1-0
_crt_atexit
_register_onexit_function
_initialize_onexit_table
terminate
_initterm_e
_c_exit
_cexit
_seh_filter_exe
_register_thread_local_exe_atexit_callback
__p___argc
_set_app_type
exit
__p___argv
_configure_narrow_argv
_initialize_narrow_environment
_get_initial_narrow_environment
_initterm
_exit
api-ms-win-crt-stdio-l1-1-0
_set_fmode
__p__commode
api-ms-win-crt-locale-l1-1-0
_configthreadlocale
api-ms-win-crt-heap-l1-1-0
free
_set_new_mode
Sections
.text Size: 208KB - Virtual size: 207KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 88KB - Virtual size: 87KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ