Static task
static1
Behavioral task
behavioral1
Sample
20bf75ec79b517943833f117a12421ff8b31cd4dd1c818f463bb35f0e1753c12.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
20bf75ec79b517943833f117a12421ff8b31cd4dd1c818f463bb35f0e1753c12.exe
Resource
win10v2004-20240419-en
General
-
Target
20bf75ec79b517943833f117a12421ff8b31cd4dd1c818f463bb35f0e1753c12
-
Size
204KB
-
MD5
75f8ce733b4af79554b4b84c643980ad
-
SHA1
4531f769404ed38bdf19195a1354e4a0ac8b4064
-
SHA256
20bf75ec79b517943833f117a12421ff8b31cd4dd1c818f463bb35f0e1753c12
-
SHA512
b35e4ab5a9d48fb71c8e66d225b4613c4ed0dddf765f6884faeefea03412a1b0ae65c0dfb16cbd247371a182100b2e1f9dffbbfd7b70b06ecc91f20a41cc326d
-
SSDEEP
3072:UdGaTPrrIGvvyy8dHSi+OcGMrOpOVKdOyMbkrWRdg+E2uEPczTinJhV+p9GEVFU/:OGazIc6TVBMrOpzeJEsuirSGEMpgE
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 20bf75ec79b517943833f117a12421ff8b31cd4dd1c818f463bb35f0e1753c12
Files
-
20bf75ec79b517943833f117a12421ff8b31cd4dd1c818f463bb35f0e1753c12.exe windows:4 windows x86 arch:x86
e12f72e7fe59535708698b4de0340a02
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetOEMCP
GetWindowsDirectoryW
SetErrorMode
CreateFileMappingA
GetComputerNameA
QueryPerformanceCounter
GetModuleFileNameA
SetPriorityClass
lstrcpyn
GetFileType
InitializeCriticalSection
GetLogicalDrives
GetProcessHeap
GetNumberFormatA
LocalAlloc
CreateEventW
GetTimeFormatA
GetVersionExW
GetProcessHeaps
CopyFileExW
GetHandleInformation
GlobalGetAtomNameA
FlushFileBuffers
CreateNamedPipeW
CopyFileA
GetCurrentDirectoryA
OpenWaitableTimerW
GetCommandLineW
lstrlen
CopyFileExA
FreeLibrary
SetComputerNameW
GetProcAddress
EnumCalendarInfoA
FindAtomA
GetModuleHandleW
CreatePipe
OpenProcess
CreateMailslotW
BeginUpdateResourceW
IsDebuggerPresent
GetVersionExA
GetEnvironmentStringsW
GetModuleHandleA
user32
GetSysColorBrush
RegisterClassExW
GetWindowLongA
SetMenu
ArrangeIconicWindows
DialogBoxParamW
LoadIconW
CreateIcon
CharNextA
GetMessageW
LoadImageA
TrackPopupMenuEx
mouse_event
GetParent
OpenClipboard
LoadIconW
GetIconInfo
CheckRadioButton
GetIconInfo
GetWindowTextW
OffsetRect
SetWindowPos
GetMenuStringW
CopyRect
EnumWindows
SetFocus
SetDlgItemInt
GetSystemMetrics
GetWindowTextLengthA
GetCapture
GetMenuItemCount
EnumDesktopsA
DestroyCursor
GetClassInfoExA
UpdateLayeredWindow
MonitorFromWindow
FrameRect
EnumChildWindows
FindWindowA
LoadBitmapW
RegisterClassExA
CloseWindow
IsMenu
MessageBeep
AdjustWindowRect
EnumDesktopWindows
DeleteMenu
MonitorFromRect
IsWindow
gdi32
ExtFloodFill
ExtEscape
EqualRgn
CopyEnhMetaFileW
SetPixelFormat
ResetDCW
CreatePolygonRgn
CreateDCA
SetTextJustification
GetKerningPairsA
GetDCPenColor
SetPaletteEntries
AbortPath
CreatePolyPolygonRgn
GetBkMode
advapi32
RegOpenKeyA
RegQueryValueW
RegReplaceKeyW
RegCreateKeyExW
RegRestoreKeyA
oleaut32
CreateDispTypeInfo
opengl32
glColor3iv
winspool.drv
SetPortW
AddPortExW
ScheduleJob
PrinterProperties
XcvDataW
FindNextPrinterChangeNotification
EnumPrintProcessorDatatypesW
SetPortA
ResetPrinterW
oledlg
OleUIInsertObjectA
wsock32
WSARecvEx
WSASetBlockingHook
shutdown
Sections
.text Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.oqngCF Size: 1KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.N Size: 4KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.LUV Size: 1024B - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.GOTYM Size: 2KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.AGbvFQ Size: 2KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.kkPQAu Size: 512B - Virtual size: 253KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 168KB - Virtual size: 168KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ