Static task
static1
Behavioral task
behavioral1
Sample
baeebfd22ea5f904faaf13519e4e2ff1089feb86fd48a3abc02554564f702c93.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
baeebfd22ea5f904faaf13519e4e2ff1089feb86fd48a3abc02554564f702c93.exe
Resource
win10v2004-20241007-en
General
-
Target
baeebfd22ea5f904faaf13519e4e2ff1089feb86fd48a3abc02554564f702c93
-
Size
30KB
-
MD5
2c341509ecda9d6633b2beeb095ab096
-
SHA1
dae07f6aba993e88a92a16c56333ef551f3fe11d
-
SHA256
baeebfd22ea5f904faaf13519e4e2ff1089feb86fd48a3abc02554564f702c93
-
SHA512
5e21a83aa6368a22035eeae51c13bbed765f791837db8331f201b52bd60d02b7ca91a464e5ef845a9f6342d054f81e8d70df299014357eec6b0aeef47656b076
-
SSDEEP
384:7Mu1et2cd7qGAsRIaCeAo5vk2Gf4Am8ighL1MoqsA/MWa+4xQTARbZMBnC4ptC1K:7MF2m7cFa8NfHmqREsA/MWJksVp
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource baeebfd22ea5f904faaf13519e4e2ff1089feb86fd48a3abc02554564f702c93
Files
-
baeebfd22ea5f904faaf13519e4e2ff1089feb86fd48a3abc02554564f702c93.exe windows:4 windows x86 arch:x86
98cb84e575d74df5d200a5b93d547135
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
HeapCreate
GetSystemDirectoryA
CreateMutexA
GetLastError
HeapDestroy
ExitProcess
GetCurrentProcessId
OpenProcess
CloseHandle
GetCurrentDirectoryA
CreateToolhelp32Snapshot
Process32First
Process32Next
VirtualAllocEx
VirtualProtectEx
WriteProcessMemory
GetProcAddress
CreateRemoteThread
Sleep
GetExitCodeProcess
TerminateProcess
GetCurrentProcess
IsBadWritePtr
MoveFileExA
Module32First
Module32Next
HeapFree
HeapAlloc
InitializeCriticalSection
GetCommandLineA
DuplicateHandle
CreatePipe
GetStdHandle
CreateProcessA
WaitForSingleObject
EnterCriticalSection
LeaveCriticalSection
FreeLibrary
LoadLibraryA
IsBadReadPtr
GetDriveTypeA
FindFirstFileA
FindClose
DeleteFileA
SetFileAttributesA
FindNextFileA
RemoveDirectoryA
WriteFile
CreateFileA
HeapReAlloc
advapi32
OpenProcessToken
LookupPrivilegeValueA
AdjustTokenPrivileges
RegCreateKeyExA
RegSetValueExA
RegCloseKey
RegDeleteKeyA
RegDeleteValueA
RegOpenKeyExA
crtdll
memset
strcpy
strncpy
strlen
strcat
memcpy
strcmp
shell32
ShellExecuteExA
user32
MessageBoxA
ExitWindowsEx
Sections
.code Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.text Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 11B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.flat Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE