Static task
static1
Behavioral task
behavioral1
Sample
20de4bce47b9071e5267b005417a23a9.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
20de4bce47b9071e5267b005417a23a9.exe
Resource
win10v2004-20231215-en
General
-
Target
20de4bce47b9071e5267b005417a23a9
-
Size
332KB
-
MD5
20de4bce47b9071e5267b005417a23a9
-
SHA1
5452a7a5d446c2364e2fb29f1750817d565c9a3f
-
SHA256
53cb5318d1d6aefc87a727701276db44424adefec9842f8d4d686ef07917fada
-
SHA512
1c5bb9c8593db70f2007cfc34e2c7ed59b5a3ca0b988fab7a0952d9cc57ca9b3bc5376cb85a6c4644a0f549177151aabb2f918eee1916af8c9934db208c640f4
-
SSDEEP
6144:NQuVowOBtELtjXMJb+bsBwrNkf4ED8v7t+CC3cC4/L5MRwWKw++sHPodMP+HtRwG:6uVSCt4lysBwrNkVSO7wtq2HsMEz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 20de4bce47b9071e5267b005417a23a9
Files
-
20de4bce47b9071e5267b005417a23a9.exe windows:4 windows x86 arch:x86
749c5cc74a122d17bcf330137e3a5fef
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
lstrcmpiA
FindAtomW
CreateFileA
ResumeThread
HeapCreate
ResetEvent
lstrlenA
GetTickCount
SetEvent
LoadLibraryW
GetCommandLineW
SetLastError
GetComputerNameA
GetSystemTime
GetModuleHandleA
GetDiskFreeSpaceW
LocalFree
GetFileAttributesW
CreateThread
user32
CreateWindowExA
GetDlgItem
DrawEdge
SetFocus
GetComboBoxInfo
GetClipCursor
GetKeyState
DrawStateA
DispatchMessageA
GetClassInfoA
CallWindowProcA
FillRect
CheckRadioButton
MessageBoxA
cryptdlg
EncodeRecipientID
CertTrustInit
CertTrustCertPolicy
DecodeRecipientID
CertTrustFinalPolicy
Sections
.text Size: 6KB - Virtual size: 6KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 1KB - Virtual size: 420KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 322KB - Virtual size: 321KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ