Static task
static1
Behavioral task
behavioral1
Sample
33e4d5eed3527c269467eec2ac57ae94ae34fd1d0a145505a29c51cf8e83f1b9.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
33e4d5eed3527c269467eec2ac57ae94ae34fd1d0a145505a29c51cf8e83f1b9.exe
Resource
win10v2004-20240802-en
General
-
Target
33e4d5eed3527c269467eec2ac57ae94ae34fd1d0a145505a29c51cf8e83f1b9
-
Size
1.2MB
-
MD5
dffbed44fc80ffe7a4bb6a78d9fb3e38
-
SHA1
724abc4ff27ab70064f14cdb72b497dfe8c98354
-
SHA256
33e4d5eed3527c269467eec2ac57ae94ae34fd1d0a145505a29c51cf8e83f1b9
-
SHA512
a2e029a320c790a08bf726d955d896d4be4219aeb04dd1d7f87be19c08482f49fd4a2a18f4b1ee95b1895e519ef84ad0b44391c8b4546a1d93b532b577ab4b7b
-
SSDEEP
24576:/fjgAsp7Tx7ML3ZsuoH1kDcIa9sVoCi4i5h9TatzdwCU:/M1ZTVMLpsZHOwx9sRi4i5hMNdwCU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 33e4d5eed3527c269467eec2ac57ae94ae34fd1d0a145505a29c51cf8e83f1b9
Files
-
33e4d5eed3527c269467eec2ac57ae94ae34fd1d0a145505a29c51cf8e83f1b9.exe windows:5 windows x86 arch:x86
b87afca7a1175b7eb49b7c1eb6d58adf
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetLastError
GetModuleHandleA
ExpandEnvironmentStringsA
GetEnvironmentVariableA
SetEnvironmentVariableA
GetShortPathNameW
GetTempPathW
Sleep
LoadLibraryExA
GetExitCodeProcess
WaitForSingleObject
CreateProcessW
GetCommandLineW
GetStartupInfoW
GetProcAddress
WriteConsoleA
SetConsoleTextAttribute
GetStdHandle
VirtualFree
VirtualAlloc
GetModuleFileNameW
GetVersionExA
LoadLibraryA
GetProcessHeap
SetEndOfFile
FindClose
FileTimeToSystemTime
FileTimeToLocalFileTime
GetDriveTypeA
FindFirstFileA
HeapFree
HeapAlloc
EnterCriticalSection
LeaveCriticalSection
CreateDirectoryA
GetCurrentProcessId
DeleteFileA
RemoveDirectoryA
FindNextFileA
SetStdHandle
GetFileType
SetConsoleCtrlHandler
GetModuleHandleW
ExitProcess
HeapReAlloc
GetFullPathNameA
GetFileAttributesA
GetCommandLineA
GetCurrentDirectoryA
TerminateProcess
GetCurrentProcess
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
TlsGetValue
TlsAlloc
TlsSetValue
TlsFree
InterlockedIncrement
SetLastError
GetCurrentThreadId
InterlockedDecrement
HeapCreate
DeleteCriticalSection
WriteFile
GetModuleFileNameA
SetHandleCount
GetStartupInfoA
RtlUnwind
CloseHandle
WideCharToMultiByte
GetConsoleCP
GetConsoleMode
MultiByteToWideChar
ReadFile
InitializeCriticalSectionAndSpinCount
SetFilePointer
GetCPInfo
GetACP
GetOEMCP
IsValidCodePage
LCMapStringA
LCMapStringW
FreeEnvironmentStringsA
GetEnvironmentStrings
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetSystemTimeAsFileTime
GetTimeZoneInformation
FlushFileBuffers
CreateFileW
GetConsoleOutputCP
WriteConsoleW
GetStringTypeA
GetStringTypeW
GetLocaleInfoA
HeapSize
CreateFileA
CompareStringA
CompareStringW
RaiseException
ws2_32
ntohl
Sections
.text Size: 103KB - Virtual size: 102KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 6KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 59KB - Virtual size: 58KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
-
_pyi_bootstrap.pyc
-
dllTemp32.pyc
-
pyi_carchive.pyc