Static task
static1
Behavioral task
behavioral1
Sample
4e20c8ff98d5b4d1bf175191bda267a4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4e20c8ff98d5b4d1bf175191bda267a4.exe
Resource
win10v2004-20231215-en
General
-
Target
4e20c8ff98d5b4d1bf175191bda267a4
-
Size
201KB
-
MD5
4e20c8ff98d5b4d1bf175191bda267a4
-
SHA1
06d6dacdfce3755054ed39500965276debdb8a43
-
SHA256
86a7dbedff1111973b1f3ae852dc3a40f48206a7f431212bdd030d2530b839dc
-
SHA512
d22850e909e8c745fa6383ccc6ae4247f5dd82f2b4aa193570f38abc35b3c7b786cd370ffa4becb15676d21c97981d83e1b77f1b62a84217797f8e8e3bf75c81
-
SSDEEP
6144:kerxt/PccMCZLB3AZWvAHji6Um14lqf9c3CX:kAD35B3AfDiq4cGC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4e20c8ff98d5b4d1bf175191bda267a4
Files
-
4e20c8ff98d5b4d1bf175191bda267a4.exe windows:4 windows x86 arch:x86
e3375863abbd62135baac702f4deff18
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_BYTES_REVERSED_HI
Imports
kernel32
RaiseException
LocalAlloc
GetModuleHandleA
LeaveCriticalSection
EnterCriticalSection
GetCurrentDirectoryA
GetShortPathNameA
FindResourceExA
EnumResourceLanguagesA
ResumeThread
WriteProcessMemory
LocalFree
GetCurrentThreadId
SetFileAttributesA
CreateDirectoryA
QueryPerformanceCounter
QueryPerformanceFrequency
GetPrivateProfileSectionA
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
GetProcAddress
InitializeCriticalSection
HeapValidate
lstrcatA
WideCharToMultiByte
RtlUnwind
GetStringTypeW
user32
SetFocus
AdjustWindowRectEx
DefWindowProcA
advapi32
RegCreateKeyA
RegSetValueA
RegCloseKey
ole32
CoRegisterClassObject
ReadClassStm
Sections
0 Size: 5KB - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
1 Size: 512B - Virtual size: 160B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
2 Size: - Virtual size: 1KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
3 Size: 512B - Virtual size: 566B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
4 Size: - Virtual size: 4B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
5 Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
6 Size: - Virtual size: 544B
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
7 Size: 131KB - Virtual size: 131KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
8 Size: 48KB - Virtual size: 65KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
9 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
10 Size: 10KB - Virtual size: 37KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE