Static task
static1
Behavioral task
behavioral1
Sample
b4bde73f496ce777c61b629754dea1df90167809f180028d4db92b9472518b17.exe
Resource
win7-20240729-en
General
-
Target
b4bde73f496ce777c61b629754dea1df90167809f180028d4db92b9472518b17
-
Size
527KB
-
MD5
77dec055bd9e201aa56930d0548783d3
-
SHA1
518b0260e7e07f30b0e2c82d457bf5122a90465f
-
SHA256
b4bde73f496ce777c61b629754dea1df90167809f180028d4db92b9472518b17
-
SHA512
949cfb0cd0377259ec3e067ff4eff323bf88a82ebb938ed6fe30e14c2d88dc52ce7ba53a9387e21c777d5adee99de1745156fd963ceb243ded7358f56150d233
-
SSDEEP
12288:Z8Bc3e2WpaBDgDr9NzdKPTmSrB+wFl0R+6x2uam6:ZHB8mgDrDdaT/rBBF6R+6Uuz6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b4bde73f496ce777c61b629754dea1df90167809f180028d4db92b9472518b17
Files
-
b4bde73f496ce777c61b629754dea1df90167809f180028d4db92b9472518b17.exe windows:4 windows x86 arch:x86
27e7feaf2ee24bc861a7336843293557
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetComputerNameA
GlobalMemoryStatusEx
GetProcessHeap
HeapAlloc
GlobalSize
DeviceIoControl
VirtualAlloc
VirtualFree
GetCurrentProcessId
OpenProcess
CreateToolhelp32Snapshot
Process32First
lstrlenA
CloseHandle
Process32Next
GetLogicalDriveStringsA
QueryDosDeviceA
VirtualAllocEx
VirtualFreeEx
CreateRemoteThread
GetExitCodeThread
GetEnvironmentVariableA
CreateProcessA
FindFirstFileA
FindNextFileA
FindClose
GetModuleHandleA
GetCurrentThreadId
ExitProcess
HeapReAlloc
HeapFree
IsBadReadPtr
GetModuleFileNameA
GetPrivateProfileStringA
WritePrivateProfileStringA
ReadFile
GetFileSize
WaitForSingleObject
GetStartupInfoA
WriteFile
DeleteFileA
RemoveDirectoryA
GetTickCount
MultiByteToWideChar
WideCharToMultiByte
GetUserDefaultLCID
GetCommandLineA
FreeLibrary
LoadLibraryA
LCMapStringA
TerminateProcess
CreateDirectoryA
CreateThread
CreateFileA
GetProcAddress
Sleep
user32
MessageBoxA
WaitForInputIdle
GetClassNameA
GetWindowTextA
wsprintfA
SendInput
TranslateMessage
SetForegroundWindow
SetActiveWindow
AttachThreadInput
IsWindowVisible
DispatchMessageA
GetMessageA
PeekMessageA
GetWindowThreadProcessId
SetWindowPos
FindWindowExA
MapVirtualKeyA
advapi32
GetTokenInformation
OpenProcessToken
shell32
ShellExecuteEx
ws2_32
ntohs
select
socket
htons
getsockname
connect
gethostbyname
WSACleanup
recv
send
closesocket
WSAStartup
inet_addr
WSAAsyncSelect
psapi
GetProcessImageFileNameA
ole32
CLSIDFromProgID
CLSIDFromString
CoCreateInstance
OleRun
CoInitialize
CoUninitialize
wininet
InternetTimeToSystemTime
msvcrt
strstr
malloc
realloc
free
strrchr
modf
strchr
_CIfmod
strtod
_CIpow
floor
rand
srand
sprintf
_ftol
atoi
??2@YAPAXI@Z
??3@YAXPAX@Z
shlwapi
PathFileExistsA
oleaut32
VariantTimeToSystemTime
SystemTimeToVariantTime
VariantInit
VariantCopy
SafeArrayCreate
SysAllocString
SafeArrayAllocDescriptor
SafeArrayAllocData
VariantClear
SafeArrayDestroy
SafeArrayGetDim
SafeArrayGetLBound
SafeArrayGetUBound
SafeArrayAccessData
SafeArrayUnaccessData
SafeArrayGetElemsize
SysFreeString
VarR8FromCy
VarR8FromBool
VariantChangeType
LoadTypeLi
RegisterTypeLi
LHashValOfNameSys
Sections
.text Size: 202KB - Virtual size: 202KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 173KB - Virtual size: 235KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
xubrRH0 Size: 142KB - Virtual size: 142KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 700B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ