Static task
static1
Behavioral task
behavioral1
Sample
bba198f8f7c6be90f39dfc819b96bf5caa564ef631c2c1c87809eb74e8d52d56.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
bba198f8f7c6be90f39dfc819b96bf5caa564ef631c2c1c87809eb74e8d52d56.exe
Resource
win10v2004-20240802-en
General
-
Target
bba198f8f7c6be90f39dfc819b96bf5caa564ef631c2c1c87809eb74e8d52d56
-
Size
564KB
-
MD5
c505fea0055c4eee64c15b743fa1ee4e
-
SHA1
4442d597e6caee8f884c8cb11a71c779be9eee4b
-
SHA256
bba198f8f7c6be90f39dfc819b96bf5caa564ef631c2c1c87809eb74e8d52d56
-
SHA512
b9db923c202830c163bf36234313224854e6af0b84ac5cd71d10d5c7fb7a49e7677738862bfe447e4e2b0351aa0136225dc13659e3634e7ef9fd3d428dfee5f0
-
SSDEEP
12288:aTQyApbJ/RXaTcKhZUuuN1nSqULSBd2cqavTf:8QNpbJ/4TpMhULSBwFavTf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bba198f8f7c6be90f39dfc819b96bf5caa564ef631c2c1c87809eb74e8d52d56
Files
-
bba198f8f7c6be90f39dfc819b96bf5caa564ef631c2c1c87809eb74e8d52d56.exe windows:4 windows x86 arch:x86
f86eca42d0b753a0ee75b7bf0c133e0c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SetErrorMode
SizeofResource
GetCurrentDirectoryA
RtlUnwind
ExitThread
HeapAlloc
HeapFree
HeapReAlloc
GetStartupInfoA
ExitProcess
RaiseException
GetTimeZoneInformation
GetSystemTime
GetLocalTime
GetACP
HeapSize
SetStdHandle
GetFileType
LCMapStringA
LCMapStringW
UnhandledExceptionFilter
GetVersionExA
HeapDestroy
HeapCreate
VirtualAlloc
IsBadWritePtr
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
SetHandleCount
GetStdHandle
GetStringTypeA
GetStringTypeW
SetUnhandledExceptionFilter
GetDriveTypeA
IsBadReadPtr
IsBadCodePtr
CompareStringA
CompareStringW
SetEnvironmentVariableA
GetProfileStringA
GetOEMCP
GetCPInfo
GetProcessVersion
GlobalFlags
TlsGetValue
LocalReAlloc
TlsSetValue
GlobalReAlloc
TlsFree
GlobalHandle
TlsAlloc
LocalAlloc
FindNextFileA
GetCurrentThread
lstrcmpA
MulDiv
SetLastError
GlobalFree
GetThreadLocale
GetFullPathNameA
lstrcpynA
GetVolumeInformationA
FindFirstFileA
FindClose
UnlockFile
LockFile
FlushFileBuffers
GetCurrentProcess
DuplicateHandle
FindResourceA
LoadResource
LockResource
GetVersion
lstrcatA
GetCurrentThreadId
GlobalGetAtomNameA
lstrcmpiA
GlobalAddAtomA
GlobalFindAtomA
GlobalDeleteAtom
lstrcpyA
GetModuleHandleA
FormatMessageA
LocalFree
lstrlenA
InterlockedDecrement
InterlockedIncrement
TerminateProcess
GetPrivateProfileStringA
FileTimeToLocalFileTime
FileTimeToSystemTime
GetFileTime
WideCharToMultiByte
GetFileAttributesA
GetFileSize
ReadFile
WriteFile
MoveFileA
GetProcAddress
CopyFileA
CreateMutexA
GetCommandLineA
CreateDirectoryA
GetEnvironmentVariableA
MultiByteToWideChar
ReleaseMutex
WritePrivateProfileStringA
GetModuleFileNameA
CreateThread
GetWindowsDirectoryA
LoadLibraryA
FreeLibrary
EnterCriticalSection
LeaveCriticalSection
CreateFileA
SetEndOfFile
DeleteCriticalSection
InitializeCriticalSection
SetFilePointer
GetTempPathA
GlobalAlloc
GlobalLock
GlobalUnlock
GetTickCount
DeleteFileA
CreateProcessA
WaitForSingleObject
GetExitCodeProcess
CloseHandle
Sleep
VirtualFree
GetLastError
user32
GetSysColorBrush
CopyAcceleratorTableA
SetRect
GetNextDlgGroupItem
MessageBeep
RegisterClipboardFormatA
GetScrollRange
GetScrollPos
GetTopWindow
MessageBoxA
IsChild
GetParent
WinHelpA
wsprintfA
GetClassInfoA
RegisterClassA
GetMenu
GetMenuItemCount
GetSubMenu
GetMenuItemID
TrackPopupMenu
GetDlgItem
GetWindowTextLengthA
GetWindowTextA
GetDlgCtrlID
GetKeyState
DestroyWindow
CreateWindowExA
SetWindowsHookExA
CallNextHookEx
GetClassLongA
SetPropA
UnhookWindowsHookEx
GetPropA
CallWindowProcA
RemovePropA
DefWindowProcA
GetMessageTime
GetMessagePos
GetLastActivePopup
GetForegroundWindow
GetWindow
SetWindowPos
RegisterWindowMessageA
LoadStringA
SystemParametersInfoA
GetWindowPlacement
TabbedTextOutA
TrackMouseEvent
GetCapture
IsIconic
DrawIcon
ShowWindow
MoveWindow
SetWindowRgn
LoadBitmapA
GetSystemMenu
RegisterHotKey
CreateMenu
OffsetRect
DrawFocusRect
PostThreadMessageA
BeginDeferWindowPos
EqualRect
DeferWindowPos
EndDeferWindowPos
UpdateWindow
ScreenToClient
IsZoomed
DrawFrameControl
GetClassNameA
GetWindowLongA
GetWindowRect
ReleaseCapture
SetCapture
RedrawWindow
CopyIcon
SetWindowLongA
PtInRect
IsClipboardFormatAvailable
GetClipboardData
GetSystemMetrics
GetDC
ReleaseDC
LoadCursorA
SetCursor
GetDesktopWindow
UnregisterClassA
HideCaret
ShowCaret
ExcludeUpdateRgn
DefDlgProcA
IsWindowUnicode
IsWindow
OpenClipboard
EmptyClipboard
SetClipboardData
CloseClipboard
InvalidateRect
PostMessageA
GetClientRect
DrawTextA
CreatePopupMenu
AppendMenuA
GetCursorPos
CopyRect
GetSysColor
MapDialogRect
SetWindowContextHelpId
GetMessageA
ValidateRect
PostQuitMessage
CharNextA
WindowFromPoint
DestroyMenu
IntersectRect
GrayStringA
InflateRect
EnableWindow
BringWindowToTop
SendMessageA
PeekMessageA
DispatchMessageA
TranslateMessage
KillTimer
SetTimer
LoadIconA
EndPaint
BeginPaint
ClientToScreen
GetMenuCheckMarkDimensions
GetMenuState
ModifyMenuA
SetMenuItemBitmaps
CheckMenuItem
EnableMenuItem
GetNextDlgTabItem
EndDialog
GetActiveWindow
CreateDialogIndirectParamA
SetWindowTextA
IsDialogMessageA
SetDlgItemTextA
IsWindowEnabled
CharUpperA
SendDlgItemMessageA
MapWindowPoints
GetFocus
SetActiveWindow
SetFocus
AdjustWindowRectEx
IsWindowVisible
GetScrollInfo
SetForegroundWindow
GetWindowDC
gdi32
SetBkMode
SetROP2
SetMapMode
SetViewportOrgEx
OffsetViewportOrgEx
SetViewportExtEx
ScaleViewportExtEx
SetWindowExtEx
ScaleWindowExtEx
IntersectClipRect
MoveToEx
LineTo
GetDeviceCaps
GetViewportExtEx
GetWindowExtEx
CreatePen
CreateSolidBrush
PtVisible
RectVisible
TextOutA
ExtTextOutA
Escape
GetMapMode
DPtoLP
GetTextColor
GetBkColor
LPtoDP
RestoreDC
SaveDC
PatBlt
CreateBitmap
SetBkColor
SetTextColor
GetClipBox
CreateRectRgn
GetPixel
CombineRgn
GetStockObject
GetObjectA
CreateCompatibleDC
CreateCompatibleBitmap
SelectObject
BitBlt
DeleteDC
DeleteObject
CreateDIBitmap
GetTextExtentPointA
CreateFontIndirectA
comdlg32
GetFileTitleA
winspool.drv
DocumentPropertiesA
OpenPrinterA
ClosePrinter
advapi32
RegQueryValueExA
RegOpenKeyExA
RegSetValueExA
RegCreateKeyExA
RegDeleteValueA
RegDeleteKeyA
RegCloseKey
shell32
SHBrowseForFolderA
SHGetPathFromIDListA
Shell_NotifyIconA
SHGetSpecialFolderPathA
ShellExecuteA
comctl32
ord17
ImageList_Destroy
oledlg
ord8
ole32
CoInitialize
CLSIDFromProgID
CLSIDFromString
CoGetClassObject
StgOpenStorageOnILockBytes
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
CoTaskMemFree
CoTaskMemAlloc
CoCreateInstance
OleInitialize
OleUninitialize
CoFreeUnusedLibraries
CoRegisterMessageFilter
CoRevokeClassObject
OleFlushClipboard
OleIsCurrentClipboard
CoUninitialize
olepro32
ord253
oleaut32
SysAllocString
SysFreeString
SysAllocStringByteLen
VariantClear
VariantCopy
VariantChangeType
SysAllocStringLen
VariantTimeToSystemTime
SysStringLen
ws2_32
gethostbyname
gethostname
htons
recvfrom
bind
inet_ntoa
WSAStartup
WSACleanup
recv
connect
send
closesocket
inet_addr
socket
setsockopt
WSAWaitForMultipleEvents
WSAGetLastError
wininet
InternetCloseHandle
InternetOpenA
InternetCanonicalizeUrlA
InternetGetLastResponseInfoA
HttpQueryInfoA
HttpSendRequestA
HttpAddRequestHeadersA
HttpOpenRequestA
InternetConnectA
InternetQueryDataAvailable
InternetReadFile
InternetWriteFile
InternetSetFilePointer
InternetSetStatusCallback
InternetSetOptionExA
InternetCrackUrlA
Sections
.text Size: 308KB - Virtual size: 306KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 68KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 28KB - Virtual size: 42KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
sharedda Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 152KB - Virtual size: 148KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ