Static task
static1
Behavioral task
behavioral1
Sample
33d8e4ee94f946c619ba59ecbfaf33e4b75c77edd70571d15a382cf2de2e8c76.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
33d8e4ee94f946c619ba59ecbfaf33e4b75c77edd70571d15a382cf2de2e8c76.exe
Resource
win10v2004-20231023-en
General
-
Target
33d8e4ee94f946c619ba59ecbfaf33e4b75c77edd70571d15a382cf2de2e8c76
-
Size
3.1MB
-
MD5
3cfb90c8d4a4c33e28a832a79ed89ec1
-
SHA1
e46b072f9b834a280464d95f816e2e31888e5988
-
SHA256
33d8e4ee94f946c619ba59ecbfaf33e4b75c77edd70571d15a382cf2de2e8c76
-
SHA512
6a69471ac62036d5a6bfb0c45eb299d1755e1242dff2fdd742bb09e44ed1fd6bda9ab58422326f91c63bef77136f9a5484647a68c0ec216d5e71c2e897ba5c63
-
SSDEEP
98304:N8s2i21I58pkyb3CWO/m59p4LuO2r5b+sIggQk0Jk7LA0FXGhJ:as2i2xpBN5Aglk7LA0Fi
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 33d8e4ee94f946c619ba59ecbfaf33e4b75c77edd70571d15a382cf2de2e8c76
Files
-
33d8e4ee94f946c619ba59ecbfaf33e4b75c77edd70571d15a382cf2de2e8c76.exe windows:6 windows x64 arch:x64
4059cfca12bc22ea85824087b7ff8ec6
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
MultiByteToWideChar
GlobalFlags
GetSystemInfo
GetCurrentProcessId
CreateProcessW
WideCharToMultiByte
VirtualQuery
CreateEventW
SetEvent
ResetEvent
GetSystemTimeAsFileTime
lstrcmpiW
LoadLibraryExW
WriteConsoleW
FlushFileBuffers
GetStringTypeW
SetStdHandle
FreeEnvironmentStringsW
GetEnvironmentStringsW
GetCPInfo
GetOEMCP
GetACP
IsValidCodePage
FindFirstFileExW
FlsFree
FlsSetValue
FlsGetValue
FlsAlloc
GetConsoleMode
GetConsoleOutputCP
GetFileType
SetFilePointerEx
GetStdHandle
GetCommandLineA
GetModuleHandleExW
RtlUnwind
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
RtlPcToFileHeader
RtlUnwindEx
QueryPerformanceCounter
GetStartupInfoW
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
RtlVirtualUnwind
RtlLookupFunctionEntry
RtlCaptureContext
WaitForSingleObjectEx
LoadLibraryExA
VirtualFree
VirtualAlloc
FlushInstructionCache
InterlockedPushEntrySList
InterlockedPopEntrySList
InitializeSListHead
EncodePointer
OutputDebugStringW
GetFileAttributesW
FindClose
TerminateProcess
GetCurrentProcess
FindNextFileW
GetCommandLineW
SetLastError
FreeLibrary
GetProcAddress
LoadLibraryW
FindResourceW
LoadResource
LockResource
FreeResource
SizeofResource
MulDiv
GlobalUnlock
GlobalLock
GlobalFree
GlobalAlloc
CreateThread
GetTickCount
WriteFile
LeaveCriticalSection
RaiseException
GetCurrentThreadId
GetModuleHandleW
IsDebuggerPresent
GetModuleFileNameW
TryEnterCriticalSection
EnterCriticalSection
InitializeCriticalSection
ExitProcess
CloseHandle
CreateFileW
Sleep
GetProcessHeap
DeleteCriticalSection
HeapDestroy
DecodePointer
HeapAlloc
HeapReAlloc
GetLastError
HeapSize
InitializeCriticalSectionAndSpinCount
LCMapStringW
HeapFree
user32
RegisterClassExW
PostQuitMessage
GetClassInfoExW
CharNextW
SetWindowLongPtrW
DestroyAcceleratorTable
GetClassNameW
DestroyMenu
TranslateAcceleratorW
GetWindowTextW
EndPaint
GetNextDlgTabItem
BeginPaint
IsIconic
DeleteMenu
GetDlgItem
SetFocus
UnregisterClassW
MessageBoxW
DestroyWindow
IsWindow
DefWindowProcW
DispatchMessageW
TranslateMessage
GetMessageW
PeekMessageW
GetWindowLongW
SendMessageW
IntersectRect
IsRectEmpty
WinHelpW
SetMenu
IsWindowEnabled
GetSysColor
IsChild
GetDlgCtrlID
IsDialogMessageW
DrawIcon
FillRect
SetWindowRgn
IsWindowVisible
GetFocus
CallWindowProcW
GetSystemMenu
GetLastActivePopup
GetWindowTextLengthW
SetRect
IsZoomed
ClientToScreen
DestroyIcon
RedrawWindow
ScreenToClient
GetTopWindow
SetWindowTextW
InvalidateRect
SetWindowPos
SetWindowLongW
GetKeyState
SetCursor
GetWindow
ShowWindow
EnableWindow
AdjustWindowRectEx
ReleaseDC
GetClientRect
GetSystemMetrics
GetDC
GetWindowRect
LoadImageW
GetParent
GetDesktopWindow
LoadCursorW
LoadIconW
GetActiveWindow
LoadStringW
GetWindowThreadProcessId
MonitorFromWindow
SetActiveWindow
WaitForInputIdle
GetMonitorInfoW
EnumWindows
PostMessageW
CreateWindowExW
GetWindowLongPtrW
gdi32
CreateEllipticRgn
CreateSolidBrush
CreateRoundRectRgn
GetClipBox
CreateFontIndirectW
SelectObject
CreateDIBSection
SetDIBColorTable
CreateCompatibleDC
GdiAlphaBlend
GetStockObject
GetDeviceCaps
DeleteObject
SetStretchBltMode
GetObjectW
DeleteDC
advapi32
RegOpenKeyExW
RegSetValueExW
RegCreateKeyExW
RegQueryInfoKeyW
RegDeleteKeyW
RegEnumKeyExW
RegDeleteValueW
RegCloseKey
shell32
DragFinish
DragQueryFileW
SHGetSpecialFolderPathW
Shell_NotifyIconW
ole32
CoTaskMemRealloc
CoTaskMemFree
CoTaskMemAlloc
CreateStreamOnHGlobal
CoCreateInstance
CoInitializeEx
CoUninitialize
oleaut32
VarUI4FromStr
comctl32
ImageList_AddMasked
ImageList_Create
ImageList_Destroy
InitCommonControlsEx
gdiplus
GdiplusStartup
GdiplusShutdown
GdipGetImageHeight
GdipGetImagePaletteSize
GdipCloneImage
GdipBitmapUnlockBits
GdipCreateBitmapFromStream
GdipAlloc
GdipDrawImageRectI
GdipDisposeImage
GdipGetImagePixelFormat
GdipFree
GdipBitmapLockBits
GdipCreateBitmapFromScan0
GdipGetImageGraphicsContext
GdipDeleteGraphics
GdipGetImagePalette
GdipSetCompositingMode
GdipGetImageWidth
GdipCreateBitmapFromFile
ws2_32
WSACleanup
Sections
.text Size: 245KB - Virtual size: 245KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 99KB - Virtual size: 99KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 7KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 14KB - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
_RDATA Size: 512B - Virtual size: 348B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2.7MB - Virtual size: 2.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ