Static task
static1
Behavioral task
behavioral1
Sample
bc887fcd6805824ac58a107917c6d083056d688eef39e979da25d16eb388e798.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
bc887fcd6805824ac58a107917c6d083056d688eef39e979da25d16eb388e798.exe
Resource
win10v2004-20241007-en
General
-
Target
bc887fcd6805824ac58a107917c6d083056d688eef39e979da25d16eb388e798
-
Size
240KB
-
MD5
3bbac642557b0ab934addbac0594561c
-
SHA1
0787a06f1fff51bdfdb129186df44e73d8c7d5de
-
SHA256
bc887fcd6805824ac58a107917c6d083056d688eef39e979da25d16eb388e798
-
SHA512
c91cbc77b3a67f65082f5d8187f237b9de0a6aaf1cbfb7bbd0e3157d2b8815f55a6ed71d6bda88941daed67ad6f0ee9a9e98149f11b053f81a462e17f7145730
-
SSDEEP
3072:VC2pwqpX3QufagAKaKkWvqMFh1KjP40ZZ6s5dM6Y273v9blsf:I4wqpX3qgAKaIvqRjBZVM/y
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bc887fcd6805824ac58a107917c6d083056d688eef39e979da25d16eb388e798
Files
-
bc887fcd6805824ac58a107917c6d083056d688eef39e979da25d16eb388e798.exe windows:5 windows x86 arch:x86
d4d3ffca50bc999994f856732f42114f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetComputerNameA
SetDefaultCommConfigA
SetLocaleInfoA
SetErrorMode
WriteConsoleOutputW
DeleteVolumeMountPointA
InterlockedIncrement
InterlockedDecrement
ReadConsoleOutputAttribute
GetEnvironmentStringsW
GetTimeFormatA
GetModuleHandleW
GetDateFormatA
GetCommandLineA
SetProcessPriorityBoost
LoadLibraryW
GetConsoleAliasW
DisconnectNamedPipe
GetStartupInfoA
SetLastError
GetProcAddress
SearchPathA
SetFileAttributesA
GetNumaHighestNodeNumber
ResetEvent
GetAtomNameA
LoadLibraryA
LocalAlloc
GetFileType
AddAtomW
AddAtomA
FoldStringA
GetModuleHandleA
OpenFileMappingW
BuildCommDCBA
GetShortPathNameW
Module32Next
EndUpdateResourceA
GetVersionExA
FindFirstVolumeW
UnregisterWaitEx
GetLastError
HeapFree
HeapAlloc
MultiByteToWideChar
HeapReAlloc
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
HeapCreate
VirtualFree
DeleteCriticalSection
LeaveCriticalSection
EnterCriticalSection
VirtualAlloc
Sleep
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
SetHandleCount
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
HeapSize
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
WideCharToMultiByte
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
InitializeCriticalSectionAndSpinCount
RtlUnwind
ReadFile
LCMapStringA
LCMapStringW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
GetConsoleCP
GetConsoleMode
FlushFileBuffers
SetFilePointer
SetStdHandle
CloseHandle
WriteConsoleA
GetConsoleOutputCP
WriteConsoleW
CreateFileA
user32
GetProcessDefaultLayout
Sections
.text Size: 131KB - Virtual size: 131KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 9KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 28KB - Virtual size: 3.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 70KB - Virtual size: 70KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ