Static task
static1
Behavioral task
behavioral1
Sample
33a37b5ecb6c87aa1578aaa72b9d53a91b59b87d1afcd918581fe68613a696b3.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
33a37b5ecb6c87aa1578aaa72b9d53a91b59b87d1afcd918581fe68613a696b3.exe
Resource
win10v2004-20240226-en
General
-
Target
33a37b5ecb6c87aa1578aaa72b9d53a91b59b87d1afcd918581fe68613a696b3
-
Size
251KB
-
MD5
32294c6851da7b2c7b6704af722ea258
-
SHA1
9d708c4cc100fc6ba6ffda7d9c07d5c3d05bb206
-
SHA256
33a37b5ecb6c87aa1578aaa72b9d53a91b59b87d1afcd918581fe68613a696b3
-
SHA512
5f9b92a24c421b5cf91ec8ef74e1335c90463b59f835c6b3a9ee8d226fb8073411c247a44fa78b14d9378350581adf4bb718efb92c4a06a2c247929930fd6c76
-
SSDEEP
3072:aBzjAuUfkkPk4CHtO8jAdSTxb4AJ2CMEo2N8eUu5J98WCNYMK6RsjFys4UK:8VUSHtRjhxgCfJUu5BwXRsAMK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 33a37b5ecb6c87aa1578aaa72b9d53a91b59b87d1afcd918581fe68613a696b3
Files
-
33a37b5ecb6c87aa1578aaa72b9d53a91b59b87d1afcd918581fe68613a696b3.exe windows:4 windows x86 arch:x86
7b04ecdcc5019f6daaef5a5f35122b98
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
GetProcAddress
GetACP
VirtualAlloc
GetCurrentThread
GetOEMCP
GetStartupInfoA
ReleaseMutex
CreateFileMappingW
HeapFree
UnmapViewOfFile
CreateEventW
CreateThread
WaitForMultipleObjects
CreateMutexW
SetEvent
WaitForSingleObject
TerminateThread
GetExitCodeThread
GetExitCodeProcess
CloseHandle
CreateProcessW
Sleep
GetVersionExW
GetModuleHandleW
InitializeCriticalSectionAndSpinCount
EnterCriticalSection
GetProcessHeap
HeapAlloc
OpenFileMappingW
OpenEventW
SetLastError
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
GetSystemTimeAsFileTime
GetCurrentProcessId
GetCurrentThreadId
GetTickCount
QueryPerformanceCounter
FreeLibrary
GetCommandLineW
GetSystemDirectoryW
LoadLibraryA
MapViewOfFile
lstrcpyW
GetLastError
LoadLibraryW
DeleteCriticalSection
LeaveCriticalSection
user32
LoadCursorA
LoadCursorW
GetWindowRect
LoadStringW
GetSysColorBrush
RegisterClassW
InvalidateRgn
DefWindowProcW
GetClientRect
BeginPaint
EndPaint
UnregisterClassW
GetDesktopWindow
GetWindowLongW
EnableWindow
DialogBoxParamW
IsWindow
GetParent
GetDlgItem
EndDialog
LoadIconW
SendDlgItemMessageW
MessageBoxW
PostMessageW
SetWindowLongW
SystemParametersInfoW
GetDC
ReleaseDC
SendMessageW
EnumWindows
GetSystemMetrics
SetForegroundWindow
GetWindowThreadProcessId
GetClassNameW
SetWindowPos
msvcrt
_controlfp
__dllonexit
_onexit
__p__fmode
__p__commode
fopen
_XcptFilter
_exit
_adjust_fdiv
_except_handler3
wcstok
swprintf
srand
_wcsnicmp
wcsncat
wcslen
wcsncpy
fclose
fflush
_vsnprintf
fputs
vfprintf
__setusermatherr
_initterm
__getmainargs
_acmdln
_cexit
_c_exit
exit
_wcsicmp
advapi32
RegOpenKeyA
Sections
.data Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata51 Size: 238KB - Virtual size: 238KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ggg22 Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata52 Size: 1024B - Virtual size: 1000B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 1024B - Virtual size: 96KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ