Static task
static1
Behavioral task
behavioral1
Sample
33011a14d91b3358ae2d8c22b148c3c6c2431921222be670eb1a7dfbad66a005N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
33011a14d91b3358ae2d8c22b148c3c6c2431921222be670eb1a7dfbad66a005N.exe
Resource
win10v2004-20241007-en
General
-
Target
33011a14d91b3358ae2d8c22b148c3c6c2431921222be670eb1a7dfbad66a005N
-
Size
1.0MB
-
MD5
7fc75ef06f95f51cc73366063fa59690
-
SHA1
6c03122fd7b1da70b3fe1c5f607a828ef599f5ec
-
SHA256
33011a14d91b3358ae2d8c22b148c3c6c2431921222be670eb1a7dfbad66a005
-
SHA512
eaaa45d505dd7b826dd2a1cd0e4b63fc52560b517e848d39c138d4fa32c1ea11d75b76cb72580e71d14223dbf5f8e735f371766b22e1b1f3f74bd44005e1a2f3
-
SSDEEP
24576:LLPXHs5zy6XwfKvEdoF8+hHxJy6DCGzwziP4648EcWjPb:PPcXwiJmTjPb
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 33011a14d91b3358ae2d8c22b148c3c6c2431921222be670eb1a7dfbad66a005N
Files
-
33011a14d91b3358ae2d8c22b148c3c6c2431921222be670eb1a7dfbad66a005N.exe windows:4 windows x86 arch:x86
5bbe2866133eb0476ce13999a30e6663
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
DeleteCriticalSection
EnterCriticalSection
GetCurrentProcess
GetCurrentProcessId
GetCurrentThreadId
GetFileAttributesA
GetFullPathNameA
GetLastError
GetModuleFileNameW
GetProcAddress
GetStartupInfoA
GetSystemTimeAsFileTime
GetTempPathA
GetTickCount
GetTimeZoneInformation
InitializeCriticalSection
LeaveCriticalSection
LoadLibraryA
QueryPerformanceCounter
SetUnhandledExceptionFilter
Sleep
TerminateProcess
TlsGetValue
UnhandledExceptionFilter
VirtualProtect
VirtualQuery
msvcrt
__dllonexit
__doserrno
__getmainargs
__initenv
__lconv_init
__pioinfo
__set_app_type
__setusermatherr
_access
_acmdln
_amsg_exit
_cexit
_chmod
_close
_errno
_exit
_fdopen
_filelengthi64
_fileno
_findclose
_findfirst
_fileno
_findnext
_fmode
_fstati64
_fullpath
_getcwd
_initterm
_iob
_lock
_lseeki64
_getpid
_mkdir
_mktemp
_onexit
_open
_rmdir
_snwprintf
_stati64
_strdup
_stricmp
_strnicmp
_umask
_unlink
_unlock
_utime
_vsnprintf
_wcsnicmp
_write
abort
atof
atoi
bsearch
calloc
ctime
exit
fclose
feof
ferror
fflush
fgetpos
fopen
fprintf
fputc
fputs
fread
free
fseek
fsetpos
ftell
fwprintf
fwrite
getc
getenv
islower
isspace
isupper
localeconv
malloc
memchr
memcmp
memcpy
memmove
memset
printf
putc
putchar
puts
qsort
raise
realloc
remove
rename
setlocale
signal
sprintf
sscanf
strcat
strchr
strcmp
strcpy
strcspn
strerror
strlen
strncat
strncmp
strncpy
strpbrk
strrchr
strspn
strstr
strtol
strtoul
time
vfprintf
vprintf
wcscpy
user32
CharLowerBuffA
MessageBoxW
Sections
.text Size: 848KB - Virtual size: 848KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 13KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 194KB - Virtual size: 194KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 19KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 52B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE