Behavioral task
behavioral1
Sample
32448800c740e864d3b0cbd3941f8630b5b45489134beebf69040cd8ac7b96a4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
32448800c740e864d3b0cbd3941f8630b5b45489134beebf69040cd8ac7b96a4.exe
Resource
win10v2004-20220812-en
General
-
Target
32448800c740e864d3b0cbd3941f8630b5b45489134beebf69040cd8ac7b96a4
-
Size
388KB
-
MD5
84214ed12a668cd23c43d2e798fd543f
-
SHA1
a4ec07f24ac7e6114d4b36761fbdf645ea75fe22
-
SHA256
32448800c740e864d3b0cbd3941f8630b5b45489134beebf69040cd8ac7b96a4
-
SHA512
d2e1422f773fd958bdd043f6ac9b57802081c22861d0c120e671f1f1776a03aa0c03a0b8ebdb6525e8a4b5026a05b27201710a009c1c916519487db0fb83361a
-
SSDEEP
6144:kb1pCoFHGKUbWHBFCtktTD0Jku0xJrzWbZ3p45N6Dqnfubs0X4SlwKd8oKOu7eQn:+7fH7UbUBEtk9bzy56N0Au5D890K1v
Malware Config
Signatures
-
resource yara_rule sample aspack_v212_v242
Files
-
32448800c740e864d3b0cbd3941f8630b5b45489134beebf69040cd8ac7b96a4.exe windows x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
CODE Size: 20KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 8KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 227KB - Virtual size: 232KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.aspack Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE