Static task
static1
Behavioral task
behavioral1
Sample
4b7b20d43fc71bb2e553b06c82709240N.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
4b7b20d43fc71bb2e553b06c82709240N.exe
Resource
win10v2004-20240802-en
General
-
Target
4b7b20d43fc71bb2e553b06c82709240N.exe
-
Size
188KB
-
MD5
4b7b20d43fc71bb2e553b06c82709240
-
SHA1
67f52ae6a188ddad8b6f345e123250d041bcfe96
-
SHA256
bedae44a2805efad19f86350e527b3c430d14d92fb865c904c23b7041ae8322c
-
SHA512
021b559f3ed38bca7a91e50c031ad22b40b01474128281ae7689c44b4305e9d5e2e00346fa496e2c64144780f71916c32e52d16cb78d7ca24b32d2730f774ee4
-
SSDEEP
3072:kAoZJhh4N+qvFuc7F3UVjGQQE7GLq+qx20NJX2/GAXhPgT:PkhVTNJK
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4b7b20d43fc71bb2e553b06c82709240N.exe
Files
-
4b7b20d43fc71bb2e553b06c82709240N.exe.exe windows:4 windows x86 arch:x86
1587667a9213858ec359e2a9b06626fd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
comctl32
ord17
version
GetFileVersionInfoA
GetFileVersionInfoSizeA
VerQueryValueA
kernel32
HeapDestroy
GetModuleHandleA
GetStartupInfoA
HeapCreate
ExitProcess
GetCommandLineA
AddAtomA
HeapAlloc
HeapFree
LockResource
LoadResource
FindResourceA
FindResourceExA
SetErrorMode
SetEvent
FormatMessageA
InterlockedDecrement
CreateProcessA
OpenEventA
lstrcpyA
GetTempFileNameA
GetTempPathA
WaitForSingleObject
GetFileAttributesA
GetLastError
CreateDirectoryA
GetShortPathNameA
GetWindowsDirectoryA
SetFileAttributesA
SetLastError
lstrlenA
CompareStringA
CompareStringW
GetVersionExA
GlobalLock
GetPrivateProfileIntA
GetPrivateProfileStringA
GetUserDefaultLangID
GetModuleFileNameA
RtlUnwind
RemoveDirectoryA
GetAtomNameA
DeleteFileA
Sleep
CloseHandle
lstrlenW
WideCharToMultiByte
GlobalUnlock
GlobalFree
MultiByteToWideChar
CreateFileA
CopyFileA
LocalFree
GlobalAlloc
user32
EndDialog
SetWindowLongA
DialogBoxIndirectParamA
GetWindowLongA
MessageBoxA
GetDlgItem
SendMessageA
DestroyWindow
GetClientRect
GetWindowRect
MoveWindow
CharUpperA
CharLowerA
wsprintfA
PeekMessageA
GetDC
ReleaseDC
CreateDialogParamA
BeginPaint
IsDialogMessageA
TranslateMessage
DispatchMessageA
LoadImageA
GetDesktopWindow
CreateDialogIndirectParamA
EndPaint
SetDlgItemTextA
CharNextA
gdi32
DeleteDC
SelectObject
RealizePalette
SelectPalette
UnrealizeObject
CreateCompatibleDC
GetObjectA
GetDeviceCaps
CreateHalftonePalette
CreatePalette
GetSystemPaletteEntries
GetDIBColorTable
BitBlt
advapi32
RegOpenKeyExA
RegQueryValueExA
RegSetValueExA
RegCreateKeyA
RegCloseKey
RegOpenKeyA
ole32
CoInitialize
CoUninitialize
CoCreateInstance
CoFreeAllLibraries
oleaut32
SysAllocStringLen
SysStringLen
SysAllocString
SafeArrayGetElement
SafeArrayGetUBound
SafeArrayGetLBound
SysFreeString
VariantClear
lz32
LZClose
LZOpenFileA
LZCopy
Sections
.text Size: 27KB - Virtual size: 27KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 154KB - Virtual size: 155KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
kztocvv Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE