Static task
static1
Behavioral task
behavioral1
Sample
033fe222efe1c187ce7a741c64026e29.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
033fe222efe1c187ce7a741c64026e29.exe
Resource
win10v2004-20231215-en
General
-
Target
033fe222efe1c187ce7a741c64026e29
-
Size
197KB
-
MD5
033fe222efe1c187ce7a741c64026e29
-
SHA1
fe5df7d52e6ff51ebcdbc709090d58269429d69e
-
SHA256
dc7b4fac3624f65b86ca1d985ee4c06933c1b9e04793689363570c4ca51725e5
-
SHA512
08c3539a5f0f2b16bf81273c6e8bcf21a8a6250ae1fadeaa5f99defa882530511b5b4c88962818f68862e42b0c0a8a88d2df57aca9003f454d6e1be4c0520789
-
SSDEEP
3072:xaGvn74gEjdDY4TvmamEcs2cPE31MECMfyuyOyYMusaDtuRUZAmjyy9V0:xa+74gqYPw2cPE3CYyiMusGuRofs
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 033fe222efe1c187ce7a741c64026e29
Files
-
033fe222efe1c187ce7a741c64026e29.exe windows:5 windows x86 arch:x86
68bcbd8432c47438fa2d2576416bb328
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
mfc42
ord813
ord303
ord341
ord654
ord5250
ord2558
ord4464
ord6412
ord4723
ord2652
ord2247
ord1669
ord1168
ord1262
ord2393
ord2801
ord5858
ord6199
ord4022
ord4003
ord4021
ord4020
ord720
ord3300
ord420
ord599
ord1243
ord3028
ord738
ord1199
ord2394
ord3769
ord1269
ord6339
ord1265
ord2175
ord2521
ord6140
ord4508
ord441
ord448
ord744
ord3770
ord2864
ord2523
ord993
ord1079
ord447
ord2379
ord6340
ord2162
ord5998
ord3216
ord2254
ord2161
ord2178
ord5510
ord4042
ord1647
ord429
ord4299
ord2090
ord357
ord823
ord535
ord858
ord2784
ord6215
ord860
ord3455
ord4957
ord4861
ord4826
ord3187
ord4950
ord2437
ord2171
ord2524
ord4517
ord4640
ord5020
ord5002
ord4494
ord4491
ord5021
ord3106
ord4605
ord5000
ord4416
ord5090
ord5501
ord4628
ord4657
ord5752
ord4155
ord2991
ord3417
ord5025
ord5627
ord1003
ord3449
ord4697
ord3060
ord3066
ord6336
ord2510
ord2542
ord5742
ord1747
ord5577
ord3172
ord5654
ord4423
ord4956
ord4860
ord4825
ord4387
ord3454
ord3198
ord3261
ord3280
ord3381
ord4623
ord4430
ord456
ord748
ord6080
ord6175
ord3787
ord2402
ord1992
ord3442
ord3797
ord2014
ord6395
ord5455
ord3298
ord4483
ord1781
ord2793
ord2858
ord5652
ord5019
ord5106
ord4921
ord5003
ord4730
ord4669
ord4490
ord4345
ord4338
ord4647
ord5022
ord4492
ord4512
ord4962
ord4916
ord4382
ord4645
ord2548
ord5508
ord4037
ord3268
ord4655
ord4622
ord4424
ord5824
ord4493
ord3495
ord1729
ord1133
ord1894
ord1574
ord5956
ord1876
ord266
ord1805
ord826
ord260
ord824
ord3402
ord1949
ord589
ord1175
ord764
ord4376
ord4853
ord3597
ord3721
ord3619
ord801
ord795
ord1641
ord4160
ord541
ord540
ord567
ord3663
ord3626
ord2414
ord2078
ord2116
ord609
ord5981
ord4287
ord5861
ord1140
ord1099
ord2645
ord2514
ord3956
ord613
ord6197
ord5789
ord289
ord2575
ord4396
ord3574
ord2971
ord5759
ord6192
ord5756
ord6186
ord4330
ord6189
ord6021
ord6172
ord5873
ord5794
ord5678
ord5736
ord5579
ord5571
ord6061
ord5864
ord3596
ord326
ord4234
ord5161
ord5162
ord5160
ord4905
ord4742
ord4976
ord4948
ord4358
ord4377
ord4854
ord5287
ord4835
ord3699
ord489
ord768
ord4258
ord4259
ord4715
ord1690
ord2528
ord5288
ord4439
ord2054
ord4431
ord3700
ord496
ord771
ord2882
ord3654
ord1644
ord4220
ord2584
ord2438
ord2860
ord2450
ord5787
ord5875
ord283
ord1771
ord6366
ord2413
ord2024
ord4219
ord2581
ord4401
ord3639
ord692
ord2340
ord2302
ord2737
ord5272
ord2614
ord1200
ord1148
ord2301
ord2358
ord3092
ord1979
ord5710
ord3789
ord665
ord5186
ord354
ord1567
ord268
ord940
ord939
ord2339
ord4268
ord3295
ord6154
ord2530
ord3353
ord4056
ord5471
ord4121
ord2389
ord1710
ord1715
ord5234
ord6369
ord5279
ord5064
ord5248
ord2444
ord3730
ord1726
ord4432
ord616
ord5240
ord3748
ord3089
ord2080
ord4454
ord4497
ord5882
ord2411
ord2023
ord4218
ord2578
ord4398
ord3582
ord3571
ord500
ord6453
ord699
ord6142
ord941
ord912
ord5631
ord4188
ord397
ord5860
ord1158
ord3573
ord3317
ord5785
ord2859
ord4275
ord3874
ord2107
ord2841
ord1146
ord2298
ord2642
ord319
ord4123
ord3876
ord4363
ord5089
ord4364
ord5084
ord1709
ord1711
ord3380
ord3685
ord4946
ord3254
ord2441
ord1695
ord1126
ord4470
ord2723
ord2390
ord3059
ord5100
ord5103
ord4467
ord4303
ord3350
ord5012
ord975
ord3403
ord2879
ord2878
ord4154
ord4077
ord5237
ord5285
ord2649
ord1665
ord4436
ord5252
ord4427
ord739
ord439
ord450
ord442
ord747
ord736
ord1886
ord4251
ord5495
ord2104
ord4460
ord6064
ord2494
ord2627
ord2626
ord6146
ord5883
ord4147
ord2120
ord4503
ord2884
ord5656
ord5476
ord5954
ord3104
ord6270
ord2012
ord5572
ord2919
ord4362
ord5088
ord1842
ord4242
ord5472
ord4151
ord5282
ord796
ord674
ord529
ord366
ord1270
ord1232
ord6377
ord4457
ord6000
ord2117
ord4510
ord5053
ord4701
ord6195
ord3870
ord5030
ord2997
ord1954
ord5199
ord2917
ord2803
ord958
ord6312
ord4177
ord3318
ord6010
ord5773
ord2601
ord3180
ord3183
ord3176
ord3507
ord3614
ord6026
ord5442
ord6385
ord6027
ord1105
ord3790
ord1266
ord703
ord603
ord6401
ord5445
ord1969
ord273
ord403
ord6402
ord6389
ord2890
ord3520
ord3521
ord1008
ord1195
ord4133
ord4297
ord6119
ord5788
ord562
ord4230
ord3583
ord3693
msvcrt
?terminate@@YAXXZ
_onexit
__dllonexit
??1type_info@@UAE@XZ
_except_handler3
__set_app_type
_controlfp
__p__fmode
__p__commode
_adjust_fdiv
__setusermatherr
_initterm
__getmainargs
__p__acmdln
exit
_XcptFilter
free
_strdup
setlocale
strncpy
memmove
_ftol
strtod
sprintf
strcoll
isspace
wcscpy
_purecall
_EH_prolog
__CxxFrameHandler
_exit
_setmbcp
advapi32
RegDeleteKeyA
RegSetValueExA
RegCreateKeyA
RegOpenKeyA
RegQueryValueExA
RegCloseKey
kernel32
CreateFileA
Sleep
FormatMessageA
SetThreadPriority
GetShortPathNameA
GetModuleHandleA
GetModuleFileNameA
GetLocaleInfoA
GlobalAddAtomA
lstrcatA
ResumeThread
SetCurrentDirectoryA
DeleteAtom
GlobalSize
FindResourceA
GetVersion
GetProcAddress
ResetEvent
CreateEventA
CloseHandle
GlobalGetAtomNameA
SetEvent
ExpandEnvironmentStringsA
GetLastError
lstrcpynA
GetTimeFormatA
GetDateFormatA
GetFileAttributesA
GetUserDefaultLCID
EnumDateFormatsA
GetLocalTime
GlobalAlloc
lstrlenA
EnumTimeFormatsA
lstrlenW
lstrcmpA
FreeLibrary
MulDiv
GlobalLock
lstrcmpiA
GlobalFree
InterlockedIncrement
GlobalUnlock
MultiByteToWideChar
lstrcpyA
LoadLibraryA
GetCurrentThreadId
GetStartupInfoA
ReadFile
gdi32
TextOutA
GetDeviceCaps
CreateDCA
DPtoLP
ScaleWindowExtEx
CreateFontIndirectA
GetTextExtentPointA
GetTextMetricsA
CreateICA
PtVisible
RectVisible
ExtTextOutA
Escape
GetPaletteEntries
GetStockObject
Rectangle
GetTextColor
GetBkColor
EnumFontFamiliesA
EnumFontFamiliesExA
BitBlt
CreateCompatibleDC
CreateSolidBrush
GetObjectA
DeleteObject
SelectObject
CreatePen
SetPixel
user32
IsClipboardFormatAvailable
CountClipboardFormats
OffsetRect
GetSystemMetrics
PtInRect
GetWindowRect
UpdateWindow
ClientToScreen
SetActiveWindow
MessageBeep
LoadIconA
GetDlgItem
DrawTextA
TabbedTextOutA
GrayStringA
WinHelpA
AppendMenuA
SetRect
GetSysColor
FillRect
DrawFocusRect
CopyRect
SetWindowTextA
GetWindowTextA
IsChild
EnableWindow
wsprintfA
GetNextDlgTabItem
GetParent
LoadBitmapA
BringWindowToTop
ScreenToClient
GetClassInfoA
SetCapture
GetClientRect
GetKeyState
PeekMessageA
MsgWaitForMultipleObjects
CharToOemA
LoadCursorA
SetRectEmpty
EqualRect
DrawEdge
GetCapture
GetDC
ReleaseDC
FindWindowA
EnumWindows
SetForegroundWindow
SendMessageTimeoutA
GetClassNameA
IntersectRect
GetMenuItemCount
DeleteMenu
RemoveMenu
GetSubMenu
SetTimer
KillTimer
GetAsyncKeyState
GetWindow
LoadMenuA
GetWindowLongA
SetWindowLongA
DefWindowProcA
SetWindowsHookExA
UnhookWindowsHookEx
CallNextHookEx
SendMessageA
RegisterWindowMessageA
InvalidateRect
ReleaseCapture
CharToOemBuffA
PostMessageA
RegisterClipboardFormatA
OemToCharBuffA
CreatePopupMenu
GetFocus
comdlg32
ChooseFontA
CommDlgExtendedError
shell32
ShellAboutA
DragQueryFileA
DragFinish
SHGetSpecialFolderPathA
ole32
StringFromCLSID
ReadClassStg
OleInitialize
StgOpenStorage
OleUninitialize
CoTaskMemFree
ReleaseStgMedium
OleRegGetUserType
StgCreateDocfileOnILockBytes
CreateILockBytesOnHGlobal
oleaut32
SysFreeString
SysAllocString
Sections
.text Size: 120KB - Virtual size: 118KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 65KB - Virtual size: 69KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ