Static task
static1
Behavioral task
behavioral1
Sample
2033eaede6393346df8b2e14570ece10.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
2033eaede6393346df8b2e14570ece10.exe
Resource
win10v2004-20231222-en
General
-
Target
2033eaede6393346df8b2e14570ece10
-
Size
304KB
-
MD5
2033eaede6393346df8b2e14570ece10
-
SHA1
c6d4d7816274b9360073d94012a33292846cef61
-
SHA256
55da98607aed6a403437448cdc4de10abb78c747a51fd9d76f29a7ff5552361d
-
SHA512
bdd8e1f69fa0ade4e4b89645cbb0538302810ae06f827f0761cf944f686e9175a97c7fa30d43afcf0315f4ccb4a9757408c528ae612c20816205d9e34a5ae1a1
-
SSDEEP
6144:I9PmTWiqX26fFGu8fVPs2XO/YzEPF9y0oNoSM:IN5RX2aFGuEZ/qUENk0oNoSM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2033eaede6393346df8b2e14570ece10
Files
-
2033eaede6393346df8b2e14570ece10.exe windows:4 windows x86 arch:x86
494f12b27853ead1c7ee16dce3e52653
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetTickCount
GetComputerNameA
ExitProcess
LoadLibraryW
VirtualAlloc
GetPrivateProfileIntA
GetModuleHandleW
ResetEvent
IsDebuggerPresent
MapViewOfFile
GetPriorityClass
FindClose
CreateFileMappingA
lstrlenW
CloseHandle
GetSystemTime
HeapDestroy
GetFileAttributesW
GlobalFree
FindAtomA
user32
GetMenu
FillRect
CloseWindow
EndDialog
GetClassInfoA
GetClientRect
GetDlgItem
DispatchMessageA
DestroyCaret
GetCaretPos
CreateWindowExA
CallWindowProcA
DrawStateA
ntshrui
IsFolderPrivateForUser
GetLocalPathFromNetResourceA
IsPathSharedA
IsPathSharedW
GetNetResourceFromLocalPathA
dpnet
DllGetClassObject
Sections
.text Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 352KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 295KB - Virtual size: 294KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ