Static task
static1
Behavioral task
behavioral1
Sample
033bebdf818560c4eba4837b7d7f29a25a0e6876dfa958c4c1dcd8b7665e4f48.exe
Resource
win10v2004-20230220-en
General
-
Target
033bebdf818560c4eba4837b7d7f29a25a0e6876dfa958c4c1dcd8b7665e4f48
-
Size
528KB
-
MD5
5dfff24976bff09af4222e58f07ab308
-
SHA1
c457aa12b71b24b054cc1ceeb382f0f4c0e7accb
-
SHA256
033bebdf818560c4eba4837b7d7f29a25a0e6876dfa958c4c1dcd8b7665e4f48
-
SHA512
67f291cc22b0496bc427e2af00755edd2fc6696364bb658b0a9dc208813153a4794de184dc3fc44bf533a66a23bf4262c3050255f7599700965b6313d142ab98
-
SSDEEP
12288:+NrbyD3wyPjRl6NgGI7SxS2n1jj8X+FxcNZmuU:+YzwyrqgGTdnxy+4Nd
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 033bebdf818560c4eba4837b7d7f29a25a0e6876dfa958c4c1dcd8b7665e4f48
Files
-
033bebdf818560c4eba4837b7d7f29a25a0e6876dfa958c4c1dcd8b7665e4f48.exe windows x86
fcc5ef716ee1fee9b7ffaf9728383a4d
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
ReadConsoleA
InterlockedDecrement
GetCurrentProcess
AddConsoleAliasW
GetComputerNameW
GetTickCount
GetConsoleAliasesA
GetConsoleTitleA
GetWindowsDirectoryA
CreateActCtxW
CreateDirectoryExW
SetProcessPriorityBoost
GetCalendarInfoA
FormatMessageW
WriteConsoleOutputA
FindNextVolumeW
ReadFile
GetModuleFileNameW
GetStringTypeExA
GetLogicalDriveStringsA
GetLastError
SetLastError
ReadConsoleOutputCharacterA
GetProcAddress
VirtualAlloc
FindResourceExW
IsValidCodePage
LoadLibraryA
WriteConsoleA
CreateEventW
SetCurrentDirectoryW
GlobalHandle
WaitForMultipleObjects
GetOEMCP
QueryMemoryResourceNotification
VirtualProtect
GetCurrentDirectoryA
GetVersionExA
FindAtomW
FileTimeToLocalFileTime
FindFirstVolumeW
GetCurrentProcessId
OpenFileMappingA
CommConfigDialogW
CreateThread
InitializeCriticalSectionAndSpinCount
GetStringTypeW
GetLocaleInfoA
GetConsoleAliasExesA
CreateTimerQueue
BeginUpdateResourceW
LocalUnlock
GetStringTypeA
GetSystemTimeAsFileTime
InterlockedIncrement
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
HeapFree
TerminateProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
MultiByteToWideChar
GetCommandLineA
GetStartupInfoA
RtlUnwind
RaiseException
LCMapStringA
WideCharToMultiByte
LCMapStringW
GetCPInfo
HeapAlloc
HeapCreate
VirtualFree
HeapReAlloc
GetModuleHandleW
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
GetCurrentThreadId
HeapSize
ExitProcess
GetACP
WriteFile
GetStdHandle
GetModuleFileNameA
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
SetHandleCount
GetFileType
QueryPerformanceCounter
user32
CharUpperBuffA
CharToOemBuffW
RegisterClassW
GetCaretPos
GetWindowLongW
LoadMenuW
gdi32
GetTextExtentExPointA
advapi32
ReportEventA
ReadEventLogW
ole32
CoGetPSClsid
winhttp
WinHttpCheckPlatform
WinHttpSetDefaultProxyConfiguration
WinHttpOpen
msimg32
TransparentBlt
Sections
.text Size: 337KB - Virtual size: 336KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 5KB - Virtual size: 48.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 145KB - Virtual size: 145KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 39KB - Virtual size: 38KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ