Static task
static1
Behavioral task
behavioral1
Sample
20cb5e9d1681026e27a6056944b7e4e51005df956408c1dfd297f219ff79f509.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
20cb5e9d1681026e27a6056944b7e4e51005df956408c1dfd297f219ff79f509.exe
Resource
win10v2004-20240910-en
General
-
Target
20cb5e9d1681026e27a6056944b7e4e51005df956408c1dfd297f219ff79f509
-
Size
1.3MB
-
MD5
2b6f4a7c4b86727eb672ebbe61569016
-
SHA1
405fb7a36498ac5b717d511923d6be4d7e1fbc1f
-
SHA256
20cb5e9d1681026e27a6056944b7e4e51005df956408c1dfd297f219ff79f509
-
SHA512
6a0dd1552d00b138658d5850a1955d57d6181b50e72d3a56fc5d9918a9c6727eeb1bafc6dff33765a693fc495cb87e75434794848558208cf4e468a0236b5739
-
SSDEEP
24576:PIXgCWSpRyndSJVDsVu5unzqWvX178NDFKYmKOF0zr31JwAlcR3QC0OXxc0H:OWSjaSJlsQuzqW/17gDUYmvFur31yAif
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 20cb5e9d1681026e27a6056944b7e4e51005df956408c1dfd297f219ff79f509
Files
-
20cb5e9d1681026e27a6056944b7e4e51005df956408c1dfd297f219ff79f509.exe windows:6 windows x86 arch:x86
6fe2f907eca9dbc413e5e0339b4fd597
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
ole32
CLSIDFromString
StringFromGUID2
IIDFromString
OleRun
CoUninitialize
CoInitialize
CoTaskMemFree
CoTaskMemRealloc
CoTaskMemAlloc
CoCreateInstance
shell32
Shell_NotifyIconA
ShellExecuteA
SHGetFolderPathW
wininet
InternetReadFile
InternetTimeToSystemTime
InternetCrackUrlA
InternetTimeFromSystemTime
InternetOpenA
InternetCloseHandle
InternetConnectA
HttpOpenRequestA
HttpSendRequestA
HttpQueryInfoA
InternetErrorDlg
user32
SetWindowLongA
LoadImageA
GetDesktopWindow
GetWindowLongA
GetCursorPos
MessageBoxW
SetForegroundWindow
wsprintfA
CharNextA
LoadStringA
GetMessageA
GetMessageW
TranslateMessage
DispatchMessageA
DispatchMessageW
PeekMessageA
PostMessageA
DefWindowProcA
PostQuitMessage
RegisterClassA
CreateWindowExA
DestroyWindow
ShowWindow
MsgWaitForMultipleObjectsEx
IsWindowUnicode
GetSystemMetrics
CreatePopupMenu
AppendMenuA
TrackPopupMenu
version
VerQueryValueW
GetFileVersionInfoA
GetFileVersionInfoSizeA
kernel32
GetDriveTypeW
VirtualQuery
VirtualProtect
VirtualAlloc
GetSystemInfo
TlsFree
TlsSetValue
TlsGetValue
TlsAlloc
RtlUnwind
GetFileType
GetSystemTimeAsFileTime
GetModuleHandleW
GetStartupInfoW
IsProcessorFeaturePresent
SetUnhandledExceptionFilter
UnhandledExceptionFilter
GetCPInfo
LCMapStringEx
EncodePointer
InitializeCriticalSectionEx
GetStringTypeW
GetConsoleOutputCP
GetConsoleMode
GetFileInformationByHandle
GetStdHandle
GetModuleFileNameW
InitializeSListHead
WriteConsoleW
GetFullPathNameW
CreateDirectoryW
GetCommandLineA
DecodePointer
CloseHandle
RaiseException
GetLastError
InitializeCriticalSectionAndSpinCount
DeleteCriticalSection
WaitForSingleObject
CreateMutexA
CreateEventA
WaitForMultipleObjects
FreeLibrary
GetModuleFileNameA
GetModuleHandleA
GetProcAddress
LoadLibraryExA
LoadResource
SizeofResource
lstrcmpA
lstrcmpiA
lstrcatA
lstrlenA
FindResourceA
SetDllDirectoryA
SystemTimeToTzSpecificLocalTime
MultiByteToWideChar
WideCharToMultiByte
IsDBCSLeadByte
ResetEvent
CreateThread
lstrcpyA
lstrcpynA
CreateFileA
WriteFile
OpenEventA
Sleep
DeleteFileA
GetTempPathA
GetCurrentProcess
GetVersionExA
LocalFree
ReadFile
FileTimeToSystemTime
GetCurrentProcessId
GetCurrentThreadId
GetLocalTime
FormatMessageW
GetEnvironmentVariableA
FindClose
ExitProcess
TerminateProcess
GetSystemDirectoryA
LockResource
LoadLibraryA
LocalAlloc
FormatMessageA
GetCommandLineW
SetLastError
GetNativeSystemInfo
GetModuleHandleExW
SetHandleInformation
CreatePipe
PeekNamedPipe
GetExitCodeProcess
CreateProcessA
SetEndOfFile
SetFilePointerEx
GetSystemDefaultUILanguage
GetThreadLocale
GetUserDefaultUILanguage
GetFileAttributesA
GetModuleHandleExA
LoadLibraryW
SetStdHandle
LoadLibraryExW
OpenMutexA
QueryPerformanceCounter
CreateFileW
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
IsDebuggerPresent
OutputDebugStringW
HeapFree
HeapAlloc
HeapSize
HeapReAlloc
GetTimeZoneInformation
CompareStringW
LCMapStringW
GetLocaleInfoW
IsValidLocale
GetUserDefaultLCID
EnumSystemLocalesW
FlushFileBuffers
GetFileSizeEx
ReadConsoleW
GetCurrentDirectoryW
FindFirstFileExW
FindNextFileW
IsValidCodePage
GetACP
GetOEMCP
GetEnvironmentStringsW
FreeEnvironmentStringsW
SetEnvironmentVariableW
GetProcessHeap
SetEvent
advapi32
ConvertStringSecurityDescriptorToSecurityDescriptorW
RegEnumKeyA
CryptDestroyHash
CryptHashData
CryptCreateHash
CryptGetHashParam
CryptReleaseContext
CryptAcquireContextA
RegQueryValueExA
SetSecurityDescriptorDacl
InitializeSecurityDescriptor
RegSetValueExA
RegQueryInfoKeyW
RegOpenKeyExA
RegNotifyChangeKeyValue
RegEnumKeyExA
RegDeleteValueA
RegDeleteKeyA
RegCreateKeyExA
RegCloseKey
oleaut32
VariantChangeType
GetErrorInfo
SysFreeString
VarUI4FromStr
SysAllocString
SysStringByteLen
SysAllocStringByteLen
VariantInit
VariantClear
shlwapi
ord12
gdi32
GetStockObject
crypt32
CryptUnprotectData
CryptProtectData
CryptStringToBinaryA
CryptBinaryToStringA
msi
ord117
ord189
ord31
ord159
ord160
ord91
ord115
ord44
ord204
ord168
ord137
ord141
ord8
ord67
Sections
.text Size: 436KB - Virtual size: 435KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 151KB - Virtual size: 151KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 10KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 100KB - Virtual size: 99KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 592KB - Virtual size: 596KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE