Static task
static1
Behavioral task
behavioral1
Sample
20740f5db2280ee47f7ae684b3c6bf49dbbd554bbcbd46aa77d8054e22dc6d87.exe
Resource
win10v2004-20231023-en
General
-
Target
20740f5db2280ee47f7ae684b3c6bf49dbbd554bbcbd46aa77d8054e22dc6d87
-
Size
238KB
-
MD5
c0ebd452db13c7e4cf392ef3cef4f81d
-
SHA1
9c4c199ec78fe2ea1b9aeba81fa2f28679525629
-
SHA256
20740f5db2280ee47f7ae684b3c6bf49dbbd554bbcbd46aa77d8054e22dc6d87
-
SHA512
9cf1afbaf735e693cbddf2a1b57bb4eafa6ad085e25ca2ea0ce61c8199aeacb4c8619924e24c5539503f3a0d8b233dc5a3b2135e56283f4a8a92f79314f262e1
-
SSDEEP
3072:2Pf770xAPcppkUNbzIwZuEEL9kYuqppT6ha7e9/9/pd+PeikMe:O70xHpkU1zZ09kbqpd6ha7EumM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 20740f5db2280ee47f7ae684b3c6bf49dbbd554bbcbd46aa77d8054e22dc6d87
Files
-
20740f5db2280ee47f7ae684b3c6bf49dbbd554bbcbd46aa77d8054e22dc6d87.exe windows:5 windows x86
cfa74c896431ea995bfab7a4c676d337
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteConsoleOutputCharacterA
ReadConsoleA
GetConsoleAliasA
GetUserDefaultLCID
SetConsoleScreenBufferSize
WriteConsoleInputA
AddConsoleAliasW
OpenSemaphoreA
SetTapeParameters
MoveFileWithProgressA
GetModuleHandleW
GenerateConsoleCtrlEvent
FindNextVolumeMountPointA
GetConsoleAliasExesW
WaitNamedPipeW
SetCommState
GetEnvironmentStrings
AddRefActCtx
GlobalFindAtomA
LoadLibraryW
SetCommConfig
CopyFileW
_hread
CreateEventA
SetConsoleCP
GetFileAttributesA
SetSystemPowerState
TerminateProcess
GetCompressedFileSizeA
GetTimeZoneInformation
lstrlenW
FindNextVolumeMountPointW
GetStartupInfoW
ReplaceFileA
GetConsoleAliasesW
WriteConsoleInputW
GetLastError
GetCurrentDirectoryW
SetLastError
EnumSystemCodePagesW
GlobalFree
LoadLibraryA
LocalAlloc
IsWow64Process
MoveFileA
AddVectoredExceptionHandler
RemoveDirectoryW
SetFileApisToANSI
WriteProfileSectionW
VirtualLock
GlobalGetAtomNameW
GetCurrentConsoleFont
FoldStringA
FindNextFileA
FindNextFileW
GetStringTypeW
VirtualProtect
CompareStringA
GetFileTime
QueryPerformanceFrequency
FatalAppExitA
GetShortPathNameW
FindAtomW
GetWindowsDirectoryW
DeleteFileW
MoveFileWithProgressW
GetTempPathA
ResetWriteWatch
ReadConsoleOutputCharacterW
EnumSystemLocalesW
ExpandEnvironmentStringsW
WriteConsoleW
SetLocaleInfoA
FindFirstFileA
GetNumaNodeProcessorMask
FlushFileBuffers
SetStdHandle
InterlockedIncrement
InterlockedDecrement
EncodePointer
DecodePointer
Sleep
InitializeCriticalSection
DeleteCriticalSection
EnterCriticalSection
LeaveCriticalSection
WideCharToMultiByte
HeapFree
GetCommandLineW
HeapSetInformation
RaiseException
RtlUnwind
HeapAlloc
LCMapStringW
MultiByteToWideChar
GetCPInfo
IsProcessorFeaturePresent
GetACP
GetOEMCP
IsValidCodePage
TlsAlloc
TlsGetValue
TlsSetValue
TlsFree
GetCurrentThreadId
GetProcAddress
UnhandledExceptionFilter
SetUnhandledExceptionFilter
IsDebuggerPresent
GetCurrentProcess
HeapCreate
SetHandleCount
GetStdHandle
InitializeCriticalSectionAndSpinCount
GetFileType
SetFilePointer
CloseHandle
ExitProcess
WriteFile
GetModuleFileNameW
FreeEnvironmentStringsW
GetEnvironmentStringsW
QueryPerformanceCounter
GetTickCount
GetCurrentProcessId
GetSystemTimeAsFileTime
GetLocaleInfoW
HeapSize
GetLocaleInfoA
EnumSystemLocalesA
IsValidLocale
HeapReAlloc
GetConsoleCP
GetConsoleMode
CreateFileW
user32
CharUpperA
advapi32
ClearEventLogA
AbortSystemShutdownW
winhttp
WinHttpReadData
Sections
.text Size: 176KB - Virtual size: 175KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 9KB - Virtual size: 3.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 52KB - Virtual size: 51KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ