Static task
static1
Behavioral task
behavioral1
Sample
20db12e56bc4da53ed75d51aca7403f7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
20db12e56bc4da53ed75d51aca7403f7.exe
Resource
win10v2004-20231215-en
General
-
Target
20db12e56bc4da53ed75d51aca7403f7
-
Size
165KB
-
MD5
20db12e56bc4da53ed75d51aca7403f7
-
SHA1
ede1e13f22f8aea0cf2c7ed24f5a6b8c2c91f84a
-
SHA256
cab8f3e8d2c3e3221e56038be4acd5228acb0fd0f42afb4efda56396b8efc4ed
-
SHA512
5a011c9c32e5fc2b48e27ded974c6ff507133d42fbab17449f050816168ca9bbde9e3b8c68fa603c92bfdb2632d6240faa343f1b1e0e33eb420b27c1feae8997
-
SSDEEP
3072:GkOVBIjxdw+d4uyorhFMRBtBzvgbkp5DGWPUuypY4ZC4Ri:G7BIG3o1FMztdvRphGJi4ZCA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 20db12e56bc4da53ed75d51aca7403f7
Files
-
20db12e56bc4da53ed75d51aca7403f7.exe windows:4 windows x86 arch:x86
240d7b20bd204b7e130f6198dc79b930
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetVersionExA
ExitProcess
MoveFileExA
GetFileType
CreateEventA
GetStringTypeA
lstrcatA
FreeLibrary
GetCommandLineA
GetCurrentProcess
SetLastError
DeleteCriticalSection
ExitThread
GetEnvironmentStrings
FormatMessageA
lstrcmpA
CreateFileA
SetErrorMode
GetCurrentThread
GetOEMCP
GetStartupInfoA
GetFileSize
SetEvent
GetProcAddress
LocalReAlloc
SetThreadLocale
GetACP
GetModuleHandleA
GlobalAlloc
VirtualQuery
SetFilePointer
GetVersion
SetEndOfFile
ResetEvent
HeapFree
LoadLibraryExA
ReadFile
Sleep
GetFullPathNameA
LoadLibraryA
VirtualAllocEx
LocalAlloc
GetThreadLocale
EnterCriticalSection
WideCharToMultiByte
FindClose
HeapDestroy
WaitForSingleObject
CloseHandle
CreateThread
LoadResource
GetDateFormatA
lstrcpynA
GetSystemDefaultLangID
HeapAlloc
lstrcpyA
SizeofResource
GetFileAttributesA
GetUserDefaultLCID
GlobalDeleteAtom
GetLocaleInfoA
GetLastError
VirtualAlloc
user32
SetCursor
GetMenuState
GetMessagePos
SystemParametersInfoA
GetCapture
GetScrollPos
GetPropA
GetMenuStringA
DefFrameProcA
GetMenuItemID
GetScrollRange
IsDialogMessageA
GetSubMenu
GetSysColor
EnumChildWindows
IsMenu
GetMenuItemCount
GetParent
CreateWindowExA
RegisterClassA
DrawIconEx
IsChild
GetClientRect
GetScrollInfo
DeferWindowPos
ClientToScreen
CharLowerA
GetCursorPos
GetSysColorBrush
ShowWindow
BeginPaint
GetMenuItemInfoA
GetActiveWindow
GetWindowTextA
GetWindow
comctl32
ImageList_Draw
ImageList_GetBkColor
ImageList_Create
ImageList_DrawEx
ImageList_Remove
ImageList_Add
gdi32
CreateBitmap
GetCurrentPositionEx
SaveDC
RestoreDC
SelectPalette
msvcrt
memmove
strncmp
calloc
atan
memcmp
shell32
Shell_NotifyIconA
DragQueryFileA
SHGetDiskFreeSpaceA
oleaut32
SafeArrayGetElement
RegisterTypeLib
SysAllocStringLen
SysReAllocStringLen
OleLoadPicture
comdlg32
GetOpenFileNameA
Sections
CODE Size: 37KB - Virtual size: 37KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
BSS Size: 124KB - Virtual size: 191KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 1024B - Virtual size: 871B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ