Static task
static1
Behavioral task
behavioral1
Sample
HEUR-Trojan.Win32.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
HEUR-Trojan.Win32.exe
Resource
win10v2004-20240226-en
General
-
Target
HEUR-Trojan.Win32.Generic-33d3506d116a37d514eb91951e892074f8229e0dcda6ce4c2e7880432a41152c
-
Size
135KB
-
MD5
216122f1aff70748e5ec23398e0e9641
-
SHA1
d4446129dd9beb5991a2be9918bc0487a6fb7caf
-
SHA256
33d3506d116a37d514eb91951e892074f8229e0dcda6ce4c2e7880432a41152c
-
SHA512
793b0b57cac5f4044c21422aeb4d7e50985910f1ecf4724a95779e77c9367b80c451e050715b632a1000c48210ed68d775270fc9be00506197d5c9c6b586b159
-
SSDEEP
1536:NH5wZhGZmhunyQfnh7/NmuHSu6xx/4xBgnQT1dZXDo9dNc/ymiS0TX5D5qB0FMXJ:pQsrhhx9yuk/47ZzomBm5D5LMXqNU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource HEUR-Trojan.Win32.Generic-33d3506d116a37d514eb91951e892074f8229e0dcda6ce4c2e7880432a41152c
Files
-
HEUR-Trojan.Win32.Generic-33d3506d116a37d514eb91951e892074f8229e0dcda6ce4c2e7880432a41152c.exe windows:1 windows x86 arch:x86
db821b8c11ac13e850ef2fafb2bd83bf
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
iphlpapi
GetAdaptersInfo
kernel32
GetModuleHandleA
GetProcAddress
CloseHandle
RtlUnwind
GetModuleHandleW
user32
GetCursorInfo
crtdll
__GetMainArgs
exit
raise
signal
ulib
?Initialize@FSN_FILTER@@QAEEXZ
??0DSTRING@@QAE@XZ
ntdll
RtlFreeHeap
RtlAllocateHeap
Sections
.text Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 40B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 119KB - Virtual size: 119KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 856B - Virtual size: 856B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc2 Size: 341B - Virtual size: 341B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE