Static task
static1
Behavioral task
behavioral1
Sample
20c7ef61bc4c928b2bea4cf7a158a17e18b5caf6d0707bf25e8d91dc9249f728.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
20c7ef61bc4c928b2bea4cf7a158a17e18b5caf6d0707bf25e8d91dc9249f728.exe
Resource
win10v2004-20240802-en
General
-
Target
20c7ef61bc4c928b2bea4cf7a158a17e18b5caf6d0707bf25e8d91dc9249f728
-
Size
1.5MB
-
MD5
6e063c691b9e95a95ea0bf57d55d13f3
-
SHA1
572cbd8bfdb0386ff2387c6088157ab4a61f138f
-
SHA256
20c7ef61bc4c928b2bea4cf7a158a17e18b5caf6d0707bf25e8d91dc9249f728
-
SHA512
e213b7d277a1dd500b0ae3e1c42be67c7bd83655307b2d55470f6bb81a9a84e712c0f4799ac836cdf439a7030624109067d271c8a45a86a6c8c0138301d2d89e
-
SSDEEP
24576:PDVqo5J3ys+DoQ8tY2hdursbSniPqlfXblWwEORRrvZbUEtJycgggg+YeSy:PHJ3ys+DoQ8tY2hArsbaiMXpyGNUEtkK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 20c7ef61bc4c928b2bea4cf7a158a17e18b5caf6d0707bf25e8d91dc9249f728
Files
-
20c7ef61bc4c928b2bea4cf7a158a17e18b5caf6d0707bf25e8d91dc9249f728.exe windows:4 windows x64 arch:x64
430e4315091ab57e11ac54c94e1b7f98
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
Imports
comctl32
DefSubclassProc
DrawInsert
LBItemFromPt
MakeDragList
PropertySheetW
RemoveWindowSubclass
SetWindowSubclass
dxgi
CreateDXGIFactory
kernel32
AreFileApisANSI
CancelIo
DeleteCriticalSection
EnterCriticalSection
EnumSystemGeoID
EraseTape
ExitProcess
FindFirstChangeNotificationW
FindNextChangeNotification
FindNextFileW
FindNextVolumeW
FindVolumeClose
FoldStringW
GenerateConsoleCtrlEvent
GetCommandLineW
GetConsoleWindow
GetCurrentProcess
GetCurrentThread
GetCurrentThreadId
GetDateFormatW
GetEnvironmentStringsW
GetExitCodeThread
GetFileSize
GetLargestConsoleWindowSize
GetLastError
GetLocaleInfoW
GetLogicalProcessorInformation
GetLongPathNameW
GetNumaNodeProcessorMask
GetNumberFormatW
GetNumberOfConsoleMouseButtons
GetOEMCP
GetProcessShutdownParameters
GetProcessTimes
GetStartupInfoW
GetStdHandle
GetStringTypeA
GetSystemDefaultLocaleName
GetTapeParameters
GetTapeStatus
GetTimeFormatW
GetUserDefaultLCID
GetUserGeoID
GetVolumeNameForVolumeMountPointW
InitializeCriticalSection
IsProcessInJob
IsValidCodePage
IsValidLocale
LeaveCriticalSection
MoveFileW
MoveFileWithProgressW
PeekConsoleInputW
PrepareTape
ReadConsoleW
ReadDirectoryChangesW
ReadFile
SetConsoleCursorInfo
SetConsoleCursorPosition
SetConsoleScreenBufferSize
SetFileApisToANSI
SetFilePointerEx
SetProcessAffinityMask
SetProcessShutdownParameters
SetStdHandle
SetTapeParameters
SetTapePosition
SetThreadAffinityMask
SetUnhandledExceptionFilter
SetUserGeoID
Sleep
SleepEx
SwitchToFiber
TlsGetValue
UnlockFileEx
VirtualProtect
VirtualQuery
WriteFile
__C_specific_handler
lstrcmpiW
lstrlenW
api-ms-win-crt-environment-l1-1-0
__p__environ
__p__wenviron
api-ms-win-crt-heap-l1-1-0
_set_new_mode
calloc
free
malloc
api-ms-win-crt-math-l1-1-0
__setusermatherr
api-ms-win-crt-private-l1-1-0
memcpy
api-ms-win-crt-runtime-l1-1-0
__p___argc
__p___argv
__p___wargv
__p__wcmdln
_cexit
_configure_narrow_argv
_configure_wide_argv
_crt_at_quick_exit
_crt_atexit
_exit
_initialize_narrow_environment
_initialize_wide_environment
_initterm
_set_app_type
_set_invalid_parameter_handler
abort
exit
signal
api-ms-win-crt-stdio-l1-1-0
__acrt_iob_func
__p__commode
__p__fmode
__stdio_common_vfprintf
__stdio_common_vfwprintf
fwrite
api-ms-win-crt-string-l1-1-0
strlen
strncmp
wcslen
api-ms-win-crt-time-l1-1-0
__daylight
__timezone
__tzname
_tzset
ole32
BindMoniker
CLSIDFromProgIDEx
CLSIDFromString
CoAllowSetForegroundWindow
CoCopyProxy
CoDisableCallCancellation
CoDisconnectObject
CoEnableCallCancellation
CoFileTimeNow
CoFileTimeToDosDateTime
CoGetCallContext
CoGetCancelObject
CoGetClassObject
CoGetContextToken
CoGetCurrentLogicalThreadId
CoGetInstanceFromFile
CoGetInstanceFromIStorage
CoGetMarshalSizeMax
CoGetObjectContext
CoGetStandardMarshal
CoGetStdMarshalEx
CoImpersonateClient
CoIsHandlerConnected
CoIsOle1Class
CoLockObjectExternal
CoMarshalHresult
CoMarshalInterface
CoQueryClientBlanket
CoQueryProxyBlanket
CoResumeClassObjects
CoRevertToSelf
CoRevokeInitializeSpy
CoRevokeMallocSpy
CoSetProxyBlanket
CoSuspendClassObjects
CoSwitchCallContext
CoTestCancel
CoUninitialize
CoUnmarshalHresult
CoUnmarshalInterface
CoWaitForMultipleHandles
GetClassFile
IIDFromString
IsAccelerator
MonikerCommonPrefixWith
OleDoAutoConvert
OleGetIconOfClass
OleRegGetMiscStatus
OleRegGetUserType
OleSetAutoConvert
ProgIDFromCLSID
StringFromCLSID
StringFromIID
user32
AnyPopup
BeginDeferWindowPos
CallWindowProcW
ChangeClipboardChain
CharPrevExA
CharPrevW
CharUpperBuffW
CheckDlgButton
CountClipboardFormats
DefDlgProcW
DlgDirListComboBoxW
DragDetect
DrawEdge
DrawTextW
EnableScrollBar
EnumClipboardFormats
FindWindowW
GetAltTabInfoW
GetAncestor
GetClassWord
GetClipboardOwner
GetComboBoxInfo
GetCursorPos
GetDlgItem
GetForegroundWindow
GetIconInfo
GetKeyboardLayoutList
GetListBoxInfo
GetMenu
GetMenuItemInfoW
GetMenuState
GetMenuStringW
GetNextDlgTabItem
GetParent
GetProcessDefaultLayout
GetTopWindow
GetWindow
GetWindowPlacement
GetWindowRgn
HiliteMenuItem
IsCharUpperW
IsMenu
LockSetForegroundWindow
LockWindowUpdate
LookupIconIdFromDirectoryEx
MapVirtualKeyW
MoveWindow
OemKeyScan
OemToCharBuffW
OffsetRect
PrivateExtractIconsW
RedrawWindow
RemoveMenu
RemovePropW
SetClassLongW
SetClassWord
SetDoubleClickTime
SetMenu
SetMenuItemInfoW
SetScrollInfo
SetSysColors
SetSystemCursor
SetWindowPos
SetWindowTextW
ShowCursor
TileWindows
TranslateAcceleratorW
UpdateLayeredWindow
UpdateWindow
VkKeyScanW
WaitForInputIdle
WindowFromDC
version
GetFileVersionInfoSizeW
GetFileVersionInfoW
VerQueryValueW
Sections
.text Size: 1.4MB - Virtual size: 1.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.pdata Size: 1024B - Virtual size: 924B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.xdata Size: 1024B - Virtual size: 728B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.bss Size: - Virtual size: 17KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.CRT Size: 512B - Virtual size: 96B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 204B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ