Behavioral task
behavioral1
Sample
e47abed9c4a2d76aa49f5ce9853a1521779b4e1eb8604fa2bec956cbaa23e343.exe
Resource
win10v2004-20230621-en
General
-
Target
e47abed9c4a2d76aa49f5ce9853a1521779b4e1eb8604fa2bec956cbaa23e343
-
Size
3.9MB
-
MD5
e8c8e1abc1ef2c38de386db9b4c60ef0
-
SHA1
42ace43f166a1bf07129ff0039cf071dffa1e67f
-
SHA256
e47abed9c4a2d76aa49f5ce9853a1521779b4e1eb8604fa2bec956cbaa23e343
-
SHA512
87ab9c109a6bdb271b3022d6064250c6e71bd25688c860aa8b67334ed88b7324e9441a390a1b913b977ea75e25ec868d40d719aa8dc6b7154b517a726ca17076
-
SSDEEP
98304:LYBOQ7Ck1ixm2d7+bPiWlw+El74/XeSB9Zq0uCN4gd1:mXCk4s2sJwpSlACZ
Malware Config
Signatures
-
Processes:
resource yara_rule sample aspack_v212_v242 -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource e47abed9c4a2d76aa49f5ce9853a1521779b4e1eb8604fa2bec956cbaa23e343
Files
-
e47abed9c4a2d76aa49f5ce9853a1521779b4e1eb8604fa2bec956cbaa23e343.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 12KB - Virtual size: 20KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 507KB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.aspack Size: 22KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE