Static task
static1
Behavioral task
behavioral1
Sample
bd6c330fd96af047d02de131aa63fd81c068b58ff8f6ceb675b930b6a7ba9797.exe
Resource
win7-20240903-en
General
-
Target
bd6c330fd96af047d02de131aa63fd81c068b58ff8f6ceb675b930b6a7ba9797
-
Size
318KB
-
MD5
cba3f9974037954c98332d3dda35ec57
-
SHA1
35686b7040f2a2b9cc8a3f9f183eb05b0a2eb528
-
SHA256
bd6c330fd96af047d02de131aa63fd81c068b58ff8f6ceb675b930b6a7ba9797
-
SHA512
624d1d5d4412f7af1ec7bfdee2576d52adcb0b32e834e7b835ce147446b7576ab8cb5708664804712f521761f2192cfc7723950421785c7287dfb1ad1f854505
-
SSDEEP
6144:dLLM7USXRBqZ/Wgg+ZckFumgThM/5y6F5:dLI7USXRM/WTAHkmgTCs
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bd6c330fd96af047d02de131aa63fd81c068b58ff8f6ceb675b930b6a7ba9797
Files
-
bd6c330fd96af047d02de131aa63fd81c068b58ff8f6ceb675b930b6a7ba9797.exe windows:5 windows x86 arch:x86
b155de263e538a35f883f6b596cc2c05
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
SearchPathW
DebugActiveProcessStop
OpenJobObjectA
ReadConsoleA
WaitForSingleObject
InterlockedCompareExchange
GetComputerNameW
GetNumaAvailableMemoryNode
SetCommBreak
FreeEnvironmentStringsA
GetModuleHandleW
GetConsoleAliasesLengthA
GetPriorityClass
GetEnvironmentStrings
FatalAppExitW
SetSystemTimeAdjustment
GetConsoleAliasExesLengthW
WriteConsoleOutputA
GetFileAttributesA
HeapCreate
SetConsoleMode
GetBinaryTypeA
GetModuleFileNameW
GetStdHandle
GetNumaNodeProcessorMask
BackupRead
GetProcAddress
SearchPathA
LoadLibraryA
LocalAlloc
SetCalendarInfoW
MoveFileA
QueryDosDeviceW
SetCommMask
FindAtomA
FoldStringW
CreatePipe
GetDefaultCommConfigA
FreeEnvironmentStringsW
BuildCommDCBA
WriteConsoleOutputAttribute
DebugBreak
GlobalReAlloc
CopyFileExA
GetVolumeInformationW
CreateFileA
GetLastError
GetCommandLineW
HeapFree
HeapAlloc
GetStartupInfoW
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
HeapReAlloc
Sleep
ExitProcess
WriteFile
GetModuleFileNameA
SetHandleCount
GetFileType
GetStartupInfoA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapSize
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
RtlUnwind
MultiByteToWideChar
ReadFile
LCMapStringA
WideCharToMultiByte
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
GetModuleHandleA
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetFilePointer
SetStdHandle
CloseHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
user32
GetUserObjectInformationW
SetFocus
advapi32
ObjectPrivilegeAuditAlarmA
Sections
.text Size: 161KB - Virtual size: 160KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 996KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 138KB - Virtual size: 138KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ