Static task
static1
Behavioral task
behavioral1
Sample
20afd4cd1fda01b1c1443793bb916aa2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
20afd4cd1fda01b1c1443793bb916aa2.exe
Resource
win10v2004-20231215-en
General
-
Target
20afd4cd1fda01b1c1443793bb916aa2
-
Size
152KB
-
MD5
20afd4cd1fda01b1c1443793bb916aa2
-
SHA1
7b2c51d388659d7fbb1d3ba5c13ea839977a914c
-
SHA256
91e6a2f933505f7a7633fba05fad63c1d56d458a0c81570115836073b0ab7afd
-
SHA512
3da8c7483924cba1eee144efa1d19aef4b76a05df04a7a98a6406497fc95badc93d7292e3382bf3dfd0cc591efb3697db0847952ef37ac352d6620c78e8336ed
-
SSDEEP
3072:hXX/uGOZNhMksqq9FrMFumbz1SGjhcvhZDdXnps7dXkghjw992V:xrOdMV1Qs6RSBhZ9ps7dNh4e
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 20afd4cd1fda01b1c1443793bb916aa2
Files
-
20afd4cd1fda01b1c1443793bb916aa2.exe windows:1 windows x86 arch:x86
6427b37f208889586c419d6cd332c4c0
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
CheckDlgButton
ClientToScreen
EnableMenuItem
GetCursorPos
GetDlgCtrlID
GetMenu
GetSysColor
InvalidateRect
IsDlgButtonChecked
KillTimer
LoadAcceleratorsA
LoadCursorA
MoveWindow
SetWindowPos
TrackPopupMenuEx
advapi32
RegEnumKeyA
RegLoadKeyA
RegOpenKeyExA
RegQueryValueA
kernel32
CreateFileA
ExitProcess
GetFileSize
GetModuleFileNameA
GetModuleHandleA
ReadFile
SearchPathA
SwitchToThread
VirtualAlloc
lstrcatA
lstrlenA
gdi32
CreateBrushIndirect
DeleteObject
EndDoc
FillPath
GetDeviceCaps
comctl32
FlatSB_EnableScrollBar
FlatSB_SetScrollProp
FlatSB_SetScrollRange
FlatSB_ShowScrollBar
Sections
.cr4sh Size: 1024B - Virtual size: 827B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
.ssdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.aspm Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.upx Size: 1024B - Virtual size: 288KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ