Static task
static1
Behavioral task
behavioral1
Sample
820d4733786b7467e6fb2ebedecb2b2cb511fd3e74343a66efea7287f35d5bedN.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
820d4733786b7467e6fb2ebedecb2b2cb511fd3e74343a66efea7287f35d5bedN.exe
Resource
win10v2004-20250207-en
General
-
Target
820d4733786b7467e6fb2ebedecb2b2cb511fd3e74343a66efea7287f35d5bedN.exe
-
Size
480KB
-
MD5
8b01db9ed86badb669dbf822447b65b0
-
SHA1
5147558845b11ebdb6f738d4b55bf73b966ab607
-
SHA256
820d4733786b7467e6fb2ebedecb2b2cb511fd3e74343a66efea7287f35d5bed
-
SHA512
0af36f2ea7ed634374ee10eb0c8f16284875e4da2b8f985d964013c870cc8e1bcf89f2ff3d8c09ad88e47224fb7269ddda4cd146507b003afb57b997420c6d14
-
SSDEEP
12288:1u6FtLYwnH+Ze6KKmCPOxvoE69HVjTy5ewsVCFb57Aei:1uutDH+ZgK5POxvR4jTy5wop57Ae
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 820d4733786b7467e6fb2ebedecb2b2cb511fd3e74343a66efea7287f35d5bedN.exe
Files
-
820d4733786b7467e6fb2ebedecb2b2cb511fd3e74343a66efea7287f35d5bedN.exe.exe windows:4 windows x86 arch:x86
1f951668c5044ba9266633fb0c803aa4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
CharPrevA
CharPrevExA
CharUpperA
CharUpperW
CharNextA
oleaut32
VariantCopy
SysFreeString
VariantClear
SysAllocString
kernel32
WriteFile
SetEndOfFile
GetStringTypeW
GetStringTypeA
SetConsoleCtrlHandler
FileTimeToLocalFileTime
GetCommandLineW
SetFileApisToOEM
GetVersionExA
VirtualAlloc
VirtualFree
GetProcAddress
GetModuleHandleA
MultiByteToWideChar
WideCharToMultiByte
GetLastError
FreeLibrary
LoadLibraryA
AreFileApisANSI
GetModuleFileNameA
LocalFree
FormatMessageA
FormatMessageW
GetWindowsDirectoryA
GetWindowsDirectoryW
SetFileAttributesA
SetFileAttributesW
RemoveDirectoryA
RemoveDirectoryW
MoveFileA
MoveFileW
CreateDirectoryA
CreateDirectoryW
DeleteFileA
DeleteFileW
lstrlenA
GetFullPathNameA
GetFullPathNameW
GetCurrentDirectoryA
SetCurrentDirectoryA
SetCurrentDirectoryW
GetCurrentDirectoryW
SearchPathA
SearchPathW
GetTempPathA
GetTempPathW
GetTempFileNameA
GetTempFileNameW
FindClose
FindFirstFileA
FindFirstFileW
FindNextFileA
FindNextFileW
CreateFileA
CreateFileW
CloseHandle
GetFileSize
SetFilePointer
ReadFile
SetFileTime
ExitProcess
GetCurrentProcess
CompareFileTime
FileTimeToSystemTime
CreateEventA
GetStdHandle
LeaveCriticalSection
EnterCriticalSection
ResetEvent
SetEvent
WaitForSingleObject
WaitForMultipleObjects
OpenEventA
UnmapViewOfFile
MapViewOfFile
OpenFileMappingA
SystemTimeToFileTime
GetSystemTime
FileTimeToDosDateTime
CreateThread
DeleteCriticalSection
InitializeCriticalSection
LocalFileTimeToFileTime
DosDateTimeToFileTime
GetTickCount
RaiseException
RtlUnwind
HeapAlloc
HeapFree
GetCommandLineA
GetVersion
LCMapStringA
LCMapStringW
SetUnhandledExceptionFilter
GetCurrentThreadId
TlsSetValue
TlsAlloc
SetLastError
TlsGetValue
GetEnvironmentVariableA
HeapDestroy
HeapCreate
HeapReAlloc
IsBadWritePtr
SetHandleCount
GetFileType
GetStartupInfoA
TerminateProcess
HeapSize
UnhandledExceptionFilter
FreeEnvironmentStringsA
FreeEnvironmentStringsW
GetEnvironmentStrings
GetEnvironmentStringsW
IsBadReadPtr
IsBadCodePtr
FlushFileBuffers
SetStdHandle
InterlockedDecrement
InterlockedIncrement
GetCPInfo
GetACP
GetOEMCP
Sections
.text Size: 403KB - Virtual size: 403KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 22KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 736B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.zero Size: 4KB - Virtual size: 3KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ