Static task
static1
Behavioral task
behavioral1
Sample
handler233.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
handler233.exe
Resource
win10v2004-20230220-en
General
-
Target
handler233.exe
-
Size
787KB
-
MD5
38879ab64e36b6d4397e1461b1b70326
-
SHA1
72b85403cf7eb6fbebb69091f252a9b0cee4f3b1
-
SHA256
ab457635362b65f01ef5371774dbfad1629b797f9d0a78890c13b8fc5714ae4b
-
SHA512
a9cf4eff5eab4d93f4af575542e979018e9e77a18ce434cc2533556248e3d3a11964326117f75db371850e4844a5e44c1ddeedaa2fc71b31371d84eb101a2c31
-
SSDEEP
12288:UuSstGxq9iWEhflaqAvJEH/f80o1FjCyPWV3lHAgtKwRTXkPXDaXVA:UudGQwW6flaBvJEHPo1xuV31HRTqaW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource handler233.exe
Files
-
handler233.exe.exe windows x86
bb27c4958c76443fcfe46f9765d838a2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetDefaultCommConfigW
GetCommState
InterlockedDecrement
CancelWaitableTimer
InterlockedCompareExchange
AddConsoleAliasW
SetEvent
GetProcessPriorityBoost
GetModuleHandleW
GetConsoleTitleA
ReadConsoleW
GetWindowsDirectoryA
InitializeCriticalSection
GlobalAlloc
FatalAppExitW
IsBadCodePtr
GetSystemWindowsDirectoryA
GetVersionExW
GlobalFlags
DnsHostnameToComputerNameW
FindNextVolumeW
GetConsoleAliasW
ReplaceFileW
IsDBCSLeadByte
GetModuleFileNameW
CreateActCtxA
GetTempPathW
GetLocaleInfoA
CreateJobObjectA
GetLogicalDriveStringsA
OpenMutexW
GetLastError
SetLastError
ReadConsoleOutputCharacterA
GetProcAddress
AttachConsole
VirtualAlloc
SetComputerNameA
GetTempFileNameA
LoadLibraryA
CreateFileMappingW
OpenEventA
FindAtomA
GetTapeParameters
FindFirstVolumeMountPointA
FindFirstChangeNotificationA
GetConsoleTitleW
GetConsoleCursorInfo
WaitForDebugEvent
ScrollConsoleScreenBufferA
AddConsoleAliasA
EnumCalendarInfoExA
EnumSystemLocalesW
GetConsoleAliasesLengthW
lstrlenA
SetThreadContext
GetDateFormatW
SetProcessAffinityMask
GetStringTypeExA
WideCharToMultiByte
InterlockedIncrement
InterlockedExchange
MultiByteToWideChar
Sleep
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
HeapAlloc
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCommandLineA
GetStartupInfoA
GetCPInfo
RtlUnwind
RaiseException
LCMapStringW
LCMapStringA
GetStringTypeW
HeapCreate
VirtualFree
HeapReAlloc
ExitProcess
WriteFile
GetStdHandle
GetModuleFileNameA
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetStringTypeA
HeapSize
GetACP
GetOEMCP
IsValidCodePage
GetUserDefaultLCID
EnumSystemLocalesA
IsValidLocale
InitializeCriticalSectionAndSpinCount
GetLocaleInfoW
GetModuleHandleA
gdi32
GetCharABCWidthsFloatW
GetCharABCWidthsI
EnumFontsW
GetCharWidthI
GetCharWidthA
Sections
.text Size: 689KB - Virtual size: 688KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 2.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 74KB - Virtual size: 74KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 15KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ