Static task
static1
Behavioral task
behavioral1
Sample
20b68d23161ed5496b76d31b1e0afc75.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
20b68d23161ed5496b76d31b1e0afc75.exe
Resource
win10v2004-20231222-en
General
-
Target
20b68d23161ed5496b76d31b1e0afc75
-
Size
70KB
-
MD5
20b68d23161ed5496b76d31b1e0afc75
-
SHA1
ebd8bcae099bc822e17c3bdeea076aa4554897af
-
SHA256
53c118d6ac58450a96a6579f591aa9494fa9f31e4930e370817e1f47985e0341
-
SHA512
4990313574bd24c254259d436364a0c515b89562d12c555d0aec2d0062d7323468b550505311645c6d1204916fe799bbdb56f1eedca72cb49a34512d6efe5d75
-
SSDEEP
1536:kpB/plCXRzIGRnDyB2QypAPvVf19GeupnhYKn4SWu:kpRplChMGRDy3IA97GeupnhH4SWu
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 20b68d23161ed5496b76d31b1e0afc75
Files
-
20b68d23161ed5496b76d31b1e0afc75.exe windows:4 windows x86 arch:x86
f36b46f28022ee4585e06a33f3539738
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetCurrentThreadId
GetVersionExA
WaitForSingleObject
InitializeCriticalSection
HeapDestroy
DeleteCriticalSection
lstrlenW
WinExec
lstrcatA
FreeResource
GlobalFree
GlobalHandle
LockResource
LoadResource
FindResourceA
GlobalAlloc
EnterCriticalSection
GlobalLock
InterlockedIncrement
InterlockedDecrement
WideCharToMultiByte
lstrcmpA
FlushInstructionCache
GetCurrentProcess
FindClose
FindFirstFileA
LeaveCriticalSection
Sleep
GetTickCount
WriteFile
MultiByteToWideChar
DeleteFileA
CreateFileA
SetFilePointer
CreateThread
ResumeThread
GetModuleHandleA
GetProcAddress
CreateMutexA
GetLastError
CloseHandle
GetTempPathA
lstrlenA
CreateDirectoryA
lstrcpyA
GlobalUnlock
CreateProcessA
GetStartupInfoA
user32
CharLowerA
PostMessageA
ShowWindow
GetWindowRect
SetWindowPos
SetWindowTextA
SetTimer
InvalidateRgn
EndDialog
GetDlgItem
EnableWindow
DefWindowProcA
DialogBoxParamA
KillTimer
InvalidateRect
SetCapture
ReleaseCapture
CreateAcceleratorTableA
GetWindowTextLengthA
GetClassNameA
RedrawWindow
GetDesktopWindow
BeginPaint
FillRect
EndPaint
CallWindowProcA
DestroyWindow
SetFocus
MessageBeep
SetDlgItemTextA
GetWindowTextA
GetDlgItemInt
SetDlgItemInt
CreateWindowExA
MessageBoxA
GetActiveWindow
GetDC
ReleaseDC
GetFocus
IsChild
GetSysColor
IsWindow
SetRect
wsprintfA
LoadStringA
CharNextA
SetWindowLongA
RegisterWindowMessageA
GetClassInfoExA
LoadCursorA
RegisterClassExA
DialogBoxIndirectParamA
GetWindowLongA
GetParent
GetWindow
GetClientRect
MapWindowPoints
SendMessageA
SystemParametersInfoA
gdi32
GetStockObject
GetObjectA
DeleteObject
CreateCompatibleBitmap
CreateCompatibleDC
SelectObject
BitBlt
DeleteDC
CreateSolidBrush
GetDeviceCaps
advapi32
RegCloseKey
RegQueryValueA
RegSetValueExA
RegQueryValueExA
RegCreateKeyExA
RegOpenKeyExA
RegDeleteKeyA
ole32
OleLockRunning
CoTaskMemAlloc
StringFromCLSID
CoCreateInstance
CLSIDFromString
CLSIDFromProgID
OleUninitialize
OleInitialize
CreateStreamOnHGlobal
CoCreateGuid
CoInitialize
CoUninitialize
CoTaskMemFree
oleaut32
OleCreateFontIndirect
DispCallFunc
SysAllocString
SysStringLen
LoadRegTypeLi
SysAllocStringLen
SysFreeString
VariantClear
comctl32
InitCommonControlsEx
wininet
InternetCanonicalizeUrlA
InternetCrackUrlA
InternetOpenA
InternetSetStatusCallback
InternetConnectA
HttpOpenRequestA
HttpSendRequestA
HttpQueryInfoA
InternetReadFile
InternetSetOptionA
InternetErrorDlg
InternetQueryOptionA
InternetCloseHandle
msvcrt
strstr
??2@YAPAXI@Z
_ftol
atol
atoi
_mbsrchr
atof
_mbscmp
_mbsstr
free
wcslen
_ismbcspace
memmove
vsprintf
malloc
_ismbcdigit
_purecall
__dllonexit
_onexit
_exit
_XcptFilter
exit
_acmdln
__getmainargs
_initterm
__setusermatherr
_adjust_fdiv
__p__commode
__p__fmode
__set_app_type
_except_handler3
_controlfp
??3@YAXPAX@Z
shell32
ShellExecuteA
Sections
.rdata Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 42KB - Virtual size: 41KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ