Static task
static1
Behavioral task
behavioral1
Sample
bba8622139627c61f8080c1d4d5170b13cae5e02deb6560691bc57d0b6f8d481N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
bba8622139627c61f8080c1d4d5170b13cae5e02deb6560691bc57d0b6f8d481N.exe
Resource
win10v2004-20241007-en
General
-
Target
bba8622139627c61f8080c1d4d5170b13cae5e02deb6560691bc57d0b6f8d481N
-
Size
272KB
-
MD5
1f258deee67d1315b3fd5cfb3b444b80
-
SHA1
cd3b006fc4978f60e151825e3eeed8fd2c79e3d6
-
SHA256
bba8622139627c61f8080c1d4d5170b13cae5e02deb6560691bc57d0b6f8d481
-
SHA512
00e7942d01e846fb062ebe5320ee94ce207fc43d2ad2c973aee285d2c01a99eb2c984d1a2efc0b023eae30e7f1acad230d9f10d850169654e2ea6b9dc0be12d6
-
SSDEEP
192:XNVaVRxI1EoeAL/HlfMRURvm0kxI1E5LJLlFtWEN:X3GRu11eAL/lMRUR6u1Sf3N
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bba8622139627c61f8080c1d4d5170b13cae5e02deb6560691bc57d0b6f8d481N
Files
-
bba8622139627c61f8080c1d4d5170b13cae5e02deb6560691bc57d0b6f8d481N.exe windows:5 windows x86 arch:x86
55302f9acbc58f3af3ebdb6b317c83a3
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCommandLineW
GetProcAddress
LoadLibraryExW
ExitProcess
CreateEventA
WaitForSingleObject
WinExec
VirtualAllocEx
SleepEx
LoadLibraryA
GetModuleFileNameA
GetModuleHandleA
CreateFileA
CloseHandle
CreateEventA
CreateProcessA
SetEvent
CreateMutexA
ReleaseMutex
BuildCommDCBAndTimeoutsA
GetFileAttributesA
MoveFileWithProgressA
InterlockedExchangeAdd
CreateDirectoryExW
SetHandleCount
CompareStringA
CreateDirectoryW
GetCurrentActCtx
EnumResourceNamesW
GetTimeFormatW
OpenFileMappingW
TransmitCommChar
GetConsoleInputExeNameA
GetNumberOfConsoleMouseButtons
IsBadStringPtrW
ReplaceFileA
WriteProfileSectionA
GetProcessHeaps
GetConsoleInputWaitHandle
GetConsoleAliasExesW
CreateFileW
OpenMutexA
EnumSystemCodePagesW
DuplicateHandle
HeapSetInformation
SetSystemTimeAdjustment
Module32Next
CreateDirectoryA
GetCPInfoExW
MoveFileExW
GlobalUnfix
ReadFileScatter
DelayLoadFailureHook
LockFile
AddLocalAlternateComputerNameA
CreateThread
OpenSemaphoreA
AddAtomA
SetConsoleHardwareState
EndUpdateResourceA
GetStartupInfoW
ResumeThread
SetUserGeoID
LZInit
SetVolumeMountPointW
FlushFileBuffers
ReleaseActCtx
CreateMutexW
GetVolumeInformationW
Process32First
IsValidLanguageGroup
TlsSetValue
LoadModule
SetCommBreak
SetEndOfFile
GetTapePosition
OpenConsoleW
GetFileAttributesExA
SetConsoleTextAttribute
SetConsoleLocalEUDC
ReadDirectoryChangesW
HeapValidate
CreateSocketHandle
MultiByteToWideChar
GetConsoleAliasW
DosDateTimeToFileTime
GetWindowsDirectoryW
_lclose
GetConsoleFontSize
DeactivateActCtx
WriteConsoleInputW
RegisterWowBaseHandlers
EraseTape
lstrcatW
WaitForMultipleObjects
EnumSystemCodePagesA
GetStringTypeA
GetVolumeNameForVolumeMountPointW
GetFileSize
VDMOperationStarted
WideCharToMultiByte
GetCPInfo
EnumUILanguagesA
GetCommConfig
SetSystemTime
GetDiskFreeSpaceExA
TransactNamedPipe
CreateProcessInternalA
ReadConsoleOutputCharacterW
SetDllDirectoryA
GetProcessShutdownParameters
CreateMailslotW
RemoveLocalAlternateComputerNameA
CreateTapePartition
GetCalendarInfoW
DisconnectNamedPipe
FlushInstructionCache
SetEnvironmentVariableA
ReadConsoleOutputW
SetNamedPipeHandleState
GetPrivateProfileIntW
GetGeoInfoA
DeleteFileW
SetThreadLocale
LocalCompact
GetLongPathNameA
UpdateResourceA
SetFileTime
GetConsoleCommandHistoryLengthA
CreateSemaphoreW
SetFirmwareEnvironmentVariableA
VirtualAlloc
CreateJobObjectW
FreeLibrary
GetVersionExW
WriteProfileStringA
EnumCalendarInfoExA
SystemTimeToTzSpecificLocalTime
SetConsoleMenuClose
SetProcessWorkingSetSize
LoadLibraryW
GetComputerNameW
SetConsoleTitleA
SetThreadExecutionState
CopyFileExA
Sections
.text Size: 132KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE