Static task
static1
Behavioral task
behavioral1
Sample
33950430f191910eb1efe64d70b40c75bd1d410ef8ed2efa1feb00c1e4ffe17c.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
33950430f191910eb1efe64d70b40c75bd1d410ef8ed2efa1feb00c1e4ffe17c.exe
Resource
win10v2004-20230915-en
General
-
Target
33950430f191910eb1efe64d70b40c75bd1d410ef8ed2efa1feb00c1e4ffe17c
-
Size
14.8MB
-
MD5
5bb2ac8a36ca0d2a6eb0201cbba76710
-
SHA1
6c78b599b9b5071506e8994fb2605ad89045e7f9
-
SHA256
33950430f191910eb1efe64d70b40c75bd1d410ef8ed2efa1feb00c1e4ffe17c
-
SHA512
718deb06206c505ae9a498604d78f6593cc295f9b449309677486ac2433dc90de8bb1465120439a3275e0cfff9c00165c0ddba5cfb34054f4402d9aedebcc93f
-
SSDEEP
196608:4XPU+ltkNzEc1Q2vU0LfutXvlQKkTtyotVKb1RTMkwLODu/yetyYcJJZhYvFza2J:4iy0FOugpmcv/GDHL6JDy
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 33950430f191910eb1efe64d70b40c75bd1d410ef8ed2efa1feb00c1e4ffe17c
Files
-
33950430f191910eb1efe64d70b40c75bd1d410ef8ed2efa1feb00c1e4ffe17c.exe windows:6 windows x86
d3ea94810a363a25ffae345108dbec61
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
CoCreateInstance
CoUninitialize
CoInitialize
IIDFromString
StringFromGUID2
CoCreateGuid
CoTaskMemRealloc
CoTaskMemFree
CoTaskMemAlloc
shell32
SHGetFolderPathW
SHGetFolderPathA
CommandLineToArgvW
user32
LoadStringA
MessageBoxA
SendMessageTimeoutW
CharNextA
MessageBoxW
GetMessageW
GetMessageA
DispatchMessageA
DispatchMessageW
MsgWaitForMultipleObjectsEx
TranslateMessage
PeekMessageA
IsWindowUnicode
wsprintfA
kernel32
GetFileInformationByHandle
GetDriveTypeW
DeleteFileW
CreateDirectoryW
WriteConsoleW
GetModuleFileNameW
GetStdHandle
GetConsoleMode
GetConsoleCP
GetFileType
VirtualQuery
VirtualProtect
VirtualAlloc
GetSystemInfo
RtlUnwind
InitializeSListHead
QueryPerformanceCounter
GetStartupInfoW
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
GetModuleFileNameA
SizeofResource
GetCommandLineW
LoadLibraryExA
InitializeCriticalSectionAndSpinCount
FindResourceA
GetModuleHandleA
MultiByteToWideChar
GetLastError
SetDllDirectoryA
RaiseException
IsDBCSLeadByte
LoadResource
DecodePointer
GetProcAddress
DeleteCriticalSection
FreeLibrary
WideCharToMultiByte
lstrcmpiA
SetCurrentDirectoryA
DeleteFileA
GetTickCount
LocalFree
GetEnvironmentVariableA
GetModuleHandleExA
GetCurrentThreadId
Sleep
FormatMessageW
GetLocalTime
GetCurrentProcessId
FindFirstFileA
WriteFile
FileTimeToSystemTime
FindClose
WaitForSingleObject
LocalAlloc
CreateFileA
GetSystemDirectoryA
LockResource
CloseHandle
GetWindowsDirectoryA
ExitProcess
FormatMessageA
ReadFile
SetHandleInformation
CreatePipe
PeekNamedPipe
RemoveDirectoryA
CreateProcessA
CreateDirectoryA
GetExitCodeProcess
SetLastError
DeviceIoControl
FindNextFileA
CopyFileA
GetFileAttributesA
MoveFileExA
SetFileAttributesA
GetCurrentProcess
GetModuleHandleExW
GetTempPathA
GetNativeSystemInfo
GetSystemWow64DirectoryA
SetEndOfFile
SetFilePointerEx
OpenMutexA
LoadLibraryExW
LoadLibraryW
UnmapViewOfFile
FlushViewOfFile
CreateFileMappingA
OpenFileMappingA
MapViewOfFile
CreateFileW
TlsAlloc
LeaveCriticalSection
InitializeCriticalSection
TlsGetValue
GetFullPathNameW
SetStdHandle
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
HeapSize
HeapReAlloc
HeapFree
HeapAlloc
ReadConsoleW
GetFileSizeEx
FlushFileBuffers
GetCurrentDirectoryW
GetTimeZoneInformation
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetCommandLineA
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
GetProcessHeap
SwitchToThread
GetStringTypeW
TlsSetValue
TlsFree
GetSystemTimeAsFileTime
SystemTimeToTzSpecificLocalTime
OutputDebugStringW
GetLocaleInfoW
LCMapStringW
CompareStringW
EncodePointer
GetModuleHandleW
TerminateProcess
EnterCriticalSection
IsDebuggerPresent
advapi32
GetSecurityDescriptorDacl
RegDeleteValueA
RegOpenKeyExA
ConvertStringSecurityDescriptorToSecurityDescriptorW
ConvertSidToStringSidA
ConvertStringSecurityDescriptorToSecurityDescriptorA
CopySid
OpenProcessToken
GetTokenInformation
RegQueryValueExA
RegEnumValueA
RegEnumKeyExA
GetSecurityDescriptorOwner
SetFileSecurityA
CryptAcquireContextA
CryptCreateHash
CryptHashData
CryptDestroyHash
CryptGetHashParam
CryptReleaseContext
RegCloseKey
RegQueryInfoKeyW
RegDeleteKeyA
RegCreateKeyExA
RegSetValueExA
oleaut32
SysFreeString
VarUI4FromStr
GetErrorInfo
shlwapi
SHDeleteKeyA
PathIsURLA
version
GetFileVersionInfoSizeA
GetFileVersionInfoA
VerQueryValueW
msi
ord117
ord115
ord159
ord141
ord44
ord204
ord91
ord67
ord8
ord158
ord137
ord160
ord168
ord31
ord189
Sections
.text Size: 443KB - Virtual size: 443KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 162KB - Virtual size: 162KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 109.7MB - Virtual size: 109.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ