Static task
static1
Behavioral task
behavioral1
Sample
20b04564b0201d46e5d52d2359756fee.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
20b04564b0201d46e5d52d2359756fee.exe
Resource
win10v2004-20231222-en
General
-
Target
20b04564b0201d46e5d52d2359756fee
-
Size
43KB
-
MD5
20b04564b0201d46e5d52d2359756fee
-
SHA1
772d58b6dd8c4b3f37f2c6408af020dd764c747d
-
SHA256
da9c5bdf4323a20c86c96780501f8f53b8d004c8ec25d3d6764e3eb80789ec44
-
SHA512
3b1088e56ab79ac361e90d8abcf7b5559619576b5dab04f074a57204b848c5a302820c33cd109c071dcefe816c831d4911ab2ee75431baa04b8fcd3790d30ed9
-
SSDEEP
768:SJ3tkFZt3qLrhdjp3zBfo1dB4QyPrzaBS1OjWko611hql3HCSGn0dd4CrjmJ1w:/3qR1pVJQ2y5WX6zh830+Bu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 20b04564b0201d46e5d52d2359756fee
Files
-
20b04564b0201d46e5d52d2359756fee.exe windows:4 windows x86 arch:x86
36c75271898e29ada97b59dba31401f8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualFreeEx
CloseHandle
GetExitCodeThread
WaitForSingleObject
CreateRemoteThread
GetProcAddress
GetModuleHandleA
WriteProcessMemory
VirtualAllocEx
lstrlenA
CreateProcessA
WriteFile
SetFilePointer
CreateFileA
DeleteFileA
ExitProcess
lstrcatA
Process32Next
OpenProcess
Process32First
CreateToolhelp32Snapshot
GetCurrentDirectoryA
lstrcpyA
LoadLibraryA
GetLastError
CreateMutexA
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 40KB - Virtual size: 39KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE