Bell.pdb
Static task
static1
Behavioral task
behavioral1
Sample
753b2ba3f48b1d24c5488801c1ccf5a326aa703b59d2809e44aa710d3c76d3ac.dll
Resource
win7-20240708-en
General
-
Target
753b2ba3f48b1d24c5488801c1ccf5a326aa703b59d2809e44aa710d3c76d3ac.exe
-
Size
2.8MB
-
MD5
649bed846b496e33d530aadb8bb1aca3
-
SHA1
45702f48d05af26324d5ba89b6b376bd748f1ae5
-
SHA256
753b2ba3f48b1d24c5488801c1ccf5a326aa703b59d2809e44aa710d3c76d3ac
-
SHA512
a060f453dc016c4d958529c379af66f2c63540cf65f3917080af63ec2d79e85bdf7292eea65bc73167334e9b1da579875b922605fbc0e1982b26b7f101ca2efa
-
SSDEEP
49152:GVx6+py2qII/jg8UdAQD/207yVkutLLdoM+nFU95YeCczKM:GSHQddJWJLdoM+FqZzl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 753b2ba3f48b1d24c5488801c1ccf5a326aa703b59d2809e44aa710d3c76d3ac.exe
Files
-
753b2ba3f48b1d24c5488801c1ccf5a326aa703b59d2809e44aa710d3c76d3ac.exe.dll windows:6 windows x86 arch:x86
38f063b8252513e444360fa25461c4a5
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DLL
PDB Paths
Imports
kernel32
GetWindowsDirectoryA
GetCurrentDirectoryA
DeleteFileA
FindFirstChangeNotificationA
DecodePointer
WriteConsoleW
CreateThread
WaitForSingleObjectEx
CloseHandle
OutputDebugStringW
OutputDebugStringA
SetFilePointerEx
GetConsoleMode
GetConsoleCP
FlushFileBuffers
WriteFile
SetStdHandle
HeapReAlloc
HeapSize
SetConsoleCtrlHandler
GetEnvironmentVariableA
GetModuleFileNameA
LoadLibraryA
OpenMutexA
CreateMutexA
TlsAlloc
PeekNamedPipe
GetSystemDirectoryA
GetFileType
GetStdHandle
GetProcessHeap
SetEnvironmentVariableW
SetEnvironmentVariableA
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCommandLineW
GetCommandLineA
GetCPInfo
GetOEMCP
IsValidCodePage
FindNextFileW
FindNextFileA
FindFirstFileExW
FindFirstFileExA
FindClose
EnumSystemLocalesW
GetUserDefaultLCID
IsValidLocale
DuplicateHandle
ResetEvent
GetCurrentThread
GetExitCodeProcess
GetCurrentProcess
VirtualProtectEx
UnhandledExceptionFilter
SetUnhandledExceptionFilter
TerminateProcess
IsProcessorFeaturePresent
QueryPerformanceCounter
GetCurrentProcessId
GetCurrentThreadId
GetSystemTimeAsFileTime
InitializeSListHead
IsDebuggerPresent
GetStartupInfoW
GetModuleHandleW
RtlUnwind
RaiseException
InterlockedPushEntrySList
InterlockedFlushSList
GetLastError
SetLastError
EncodePointer
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
InitializeCriticalSectionAndSpinCount
TlsGetValue
TlsSetValue
TlsFree
FreeLibrary
GetProcAddress
LoadLibraryExW
ExitProcess
GetModuleHandleExW
GetModuleFileNameW
MultiByteToWideChar
WideCharToMultiByte
GetStringTypeW
GetACP
HeapAlloc
HeapFree
GetDateFormatW
GetTimeFormatW
CompareStringW
LCMapStringW
GetLocaleInfoW
CreateFileW
user32
GetWindowTextLengthA
ClientToScreen
MapWindowPoints
FrameRect
ValidateRect
SystemParametersInfoA
BeginPaint
DestroyMenu
GetSystemMetrics
EmptyClipboard
SetWindowsHookExA
PostMessageA
RegisterClassExA
InvalidateRect
gdi32
DPtoLP
GetObjectA
DeleteObject
DeleteDC
CreatePen
CreateDCA
BitBlt
ole32
OleCreate
CoSuspendClassObjects
OleUninitialize
StgCreateDocfile
CoUninitialize
OleInitialize
CoInitialize
ws2_32
getprotobynumber
WSAWaitForMultipleEvents
socket
getservbyname
setsockopt
WSACloseEvent
WSACleanup
getservbyport
WSASocketA
WSAConnect
WSAStartup
comctl32
_TrackMouseEvent
ImageList_DragLeave
ImageList_GetIcon
ImageList_Add
ord17
Exports
Exports
@Off@4
@Ranglad@8
@Spreadletter@0
Sections
.text Size: 1.7MB - Virtual size: 1.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 840B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ