Static task
static1
Behavioral task
behavioral1
Sample
616204d0d26fc4310cfc6bd395de1d20N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
616204d0d26fc4310cfc6bd395de1d20N.exe
Resource
win10v2004-20240709-en
General
-
Target
616204d0d26fc4310cfc6bd395de1d20N.exe
-
Size
155KB
-
MD5
616204d0d26fc4310cfc6bd395de1d20
-
SHA1
87193b165f6b9c92bdc08ac59f28cb7032e2f5e0
-
SHA256
b3bc07d7aa260ec5d65d871ffcbd940c8fbf224f3c4a971bc0fe2d01968c8808
-
SHA512
f39418393fa1740a1f89d54301787af27025dadd9a4c41ce078e7e853e446d3c53939baf1c25804c068e9010a23d094373c5c79295f894cc25eaef5c6017c10a
-
SSDEEP
3072:OS/5won4ZO+2zNaGHuxX49f3bUZ7gpgNSfix0cHIPvxnw:+n+HHuxX49WC6O9vxw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 616204d0d26fc4310cfc6bd395de1d20N.exe
Files
-
616204d0d26fc4310cfc6bd395de1d20N.exe.exe windows:4 windows x86 arch:x86
d47264e657cde6db9b439340a5090c3e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
DeleteFileA
MulDiv
CreateFileA
WaitForSingleObject
GetFileAttributesA
CreateSemaphoreA
CreateThread
GetLastError
SetFilePointer
CompareStringA
SetEndOfFile
InterlockedIncrement
InterlockedDecrement
GetEnvironmentStringsW
GetEnvironmentStrings
FreeEnvironmentStringsW
FreeEnvironmentStringsA
UnhandledExceptionFilter
GetCurrentProcess
TerminateProcess
TlsGetValue
SetLastError
TlsAlloc
TlsSetValue
GetCurrentThreadId
GetStringTypeW
GetStringTypeA
LCMapStringW
LCMapStringA
MultiByteToWideChar
WideCharToMultiByte
GetOEMCP
GetACP
GetCPInfo
ReadFile
WriteFile
FlushFileBuffers
GetStdHandle
SetHandleCount
GetFileType
SetStdHandle
RtlUnwind
LeaveCriticalSection
EnterCriticalSection
DeleteCriticalSection
InitializeCriticalSection
GetModuleFileNameA
VirtualFree
HeapCreate
SetEnvironmentVariableA
CloseHandle
CompareStringW
ReleaseSemaphore
GetVersionExA
GetProcAddress
FreeLibrary
RemoveDirectoryA
CreateDirectoryA
GetEnvironmentVariableA
ExitProcess
lstrlenA
LoadLibraryA
HeapFree
HeapDestroy
VirtualAlloc
HeapReAlloc
HeapAlloc
GetLocalTime
GetTimeZoneInformation
GetSystemTime
GetCommandLineA
GetModuleHandleA
GetStartupInfoA
GetVersion
user32
LoadStringA
SetWindowPos
MessageBoxA
GetSystemMetrics
GetWindowRect
DefWindowProcA
UpdateWindow
ShowWindow
CreateWindowExA
RegisterClassA
InvalidateRect
EndPaint
GetSysColor
DrawIcon
BeginPaint
IsWindowVisible
CallWindowProcA
GetWindowLongA
GetWindowTextA
GetClientRect
SetWindowLongW
GetFocus
GetWindow
FillRect
SetCaretPos
DestroyCaret
CreateCaret
ShowCaret
CallWindowProcW
GetParent
KillTimer
IsDlgButtonChecked
CheckDlgButton
LoadIconA
SetFocus
GetKeyState
GetKeyboardLayout
DialogBoxParamA
IsWindowEnabled
GetDlgItem
SendDlgItemMessageA
SetWindowTextA
SetForegroundWindow
SetTimer
EndDialog
ActivateKeyboardLayout
SendMessageA
GetDC
ReleaseDC
SystemParametersInfoA
SetWindowLongA
gdi32
CreateCompatibleDC
GetTextExtentPoint32W
ExtTextOutA
ExtTextOutW
SetBkColor
SetTextColor
Rectangle
CreateFontIndirectA
CreatePen
DeleteDC
GetTextMetricsA
CreateCompatibleBitmap
GetStockObject
GetDeviceCaps
SelectObject
BitBlt
TranslateCharsetInfo
DeleteObject
CreateSolidBrush
comdlg32
GetSaveFileNameA
advapi32
RegQueryValueExA
RegOpenKeyExA
RegCloseKey
shell32
SHGetMalloc
SHGetPathFromIDListA
SHBrowseForFolderA
comctl32
ord17
Sections
.text Size: 68KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 20KB - Virtual size: 22KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ