Static task
static1
Behavioral task
behavioral1
Sample
bbdf17957b1f6626adf09b2c488ec7464ade0206b7ccacc57c7ff1c07f98f78cN.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
bbdf17957b1f6626adf09b2c488ec7464ade0206b7ccacc57c7ff1c07f98f78cN.exe
Resource
win10v2004-20241007-en
General
-
Target
bbdf17957b1f6626adf09b2c488ec7464ade0206b7ccacc57c7ff1c07f98f78cN
-
Size
240KB
-
MD5
19568573f0328672b72115aa97c15110
-
SHA1
a2808f8e939a6f93dd64057d7fc43a860c1dbdce
-
SHA256
bbdf17957b1f6626adf09b2c488ec7464ade0206b7ccacc57c7ff1c07f98f78c
-
SHA512
29455ab2da59456b384d7e4c18e38e983dffa3ed12f3818d7f5ee037f0113f155b37295bbd1c1fb205e59d4d616e8268da92175373178756087a40eb35b30417
-
SSDEEP
6144:rYWahQlqGg5isOOCp7PkxfQHWOEA00vy:rYBylqGRsr+78xfgEAd6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bbdf17957b1f6626adf09b2c488ec7464ade0206b7ccacc57c7ff1c07f98f78cN
Files
-
bbdf17957b1f6626adf09b2c488ec7464ade0206b7ccacc57c7ff1c07f98f78cN.exe windows:4 windows x86 arch:x86
6d8654655dd84c2817002cabefcdae5d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrlenA
Sleep
SetEvent
FreeLibrary
VirtualAlloc
FreeResource
VirtualFree
SizeofResource
LockResource
LoadResource
FindResourceExA
GetLastError
VirtualProtect
GetModuleHandleA
ResumeThread
GetCurrentThreadId
SuspendThread
LocalAlloc
GlobalFree
WriteFile
CreateFileA
GlobalAlloc
LoadLibraryA
SystemTimeToFileTime
GetSystemTime
LCMapStringA
lstrcpyA
GetStringTypeA
MultiByteToWideChar
RaiseException
GetOEMCP
GetACP
GetCPInfo
HeapReAlloc
RtlUnwind
HeapCreate
HeapDestroy
GetFileType
GetStdHandle
SetHandleCount
GetEnvironmentStringsW
GetEnvironmentStrings
WideCharToMultiByte
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
HeapAlloc
HeapFree
GetVersion
LCMapStringW
GetCommandLineA
GetStartupInfoA
GetModuleFileNameA
VirtualQuery
CreateEventA
LoadLibraryW
GetProcAddress
CloseHandle
GetStringTypeW
ExitProcess
user32
UpdateWindow
LoadIconA
LoadCursorA
ShowWindow
EndPaint
DrawTextA
GetClientRect
CreateWindowExA
PostQuitMessage
BeginPaint
DefWindowProcA
DestroyWindow
DialogBoxParamA
LoadStringA
EndDialog
AttachThreadInput
BringWindowToTop
RegisterClassExA
LoadAcceleratorsA
TranslateAcceleratorA
GetDesktopWindow
IsWindow
IsWindowVisible
IsRectEmpty
SetRect
UnregisterClassA
PeekMessageA
TranslateMessage
DispatchMessageA
PostMessageA
GetDC
FillRect
ReleaseDC
RegisterClassA
GetMessageA
gdi32
CreateCompatibleBitmap
CreateCompatibleDC
GetObjectA
GetDIBits
Rectangle
SetROP2
SelectObject
ole32
CoUninitialize
CoCreateInstance
CoInitialize
oleaut32
VariantClear
VariantInit
pdh
PdhGetDataSourceTimeRangeW
PdhGetCounterInfoA
PdhCollectQueryData
PdhConnectMachineA
wininet
InternetOpenW
InternetCloseHandle
Sections
.text Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 172KB - Virtual size: 170KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 26KB - Virtual size: 626KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.sls Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE