Static task
static1
Behavioral task
behavioral1
Sample
44d4cef1e0c9cccf466e6402fd2f7ae26671f26a1d0e958a7bfeb0fc59e6e55d.exe
Resource
win7-20230712-en
Behavioral task
behavioral2
Sample
44d4cef1e0c9cccf466e6402fd2f7ae26671f26a1d0e958a7bfeb0fc59e6e55d.exe
Resource
win10v2004-20230703-en
General
-
Target
44d4cef1e0c9cccf466e6402fd2f7ae26671f26a1d0e958a7bfeb0fc59e6e55d
-
Size
12.3MB
-
MD5
6f5c664973ef63954eab9449e4e95b6a
-
SHA1
0fcd982a831b4f436e72eab9fec570ee623bc29e
-
SHA256
44d4cef1e0c9cccf466e6402fd2f7ae26671f26a1d0e958a7bfeb0fc59e6e55d
-
SHA512
78140f5c7147e84d95935f4975363ab8b675c24973121ae0a10591253764b8aeb6bcf194f3ceb2a3b5159d423f4e93d1640467cf2b96a1b3a3399a5deb307bfd
-
SSDEEP
196608:C//DF2Nc4/Fk/i0ZJ/xZviwvTCvral6CCKj1n3Kli3fLCT7KWAr3oG56p7tCM:pNc4/O/i+FAaYCCKBn6yLC/hAr3P56p
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 44d4cef1e0c9cccf466e6402fd2f7ae26671f26a1d0e958a7bfeb0fc59e6e55d
Files
-
44d4cef1e0c9cccf466e6402fd2f7ae26671f26a1d0e958a7bfeb0fc59e6e55d.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 110KB - Virtual size: 109KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 430KB - Virtual size: 981KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 101KB - Virtual size: 100KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.enigma1 Size: 9.7MB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.enigma2 Size: 300KB - Virtual size: 300KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE