Behavioral task
behavioral1
Sample
JC_30332892b06801b7aa8b2721fcbb140fa68ef32f460b6d7ca961f0a77aa6568a.exe
Resource
win7-20230831-en
General
-
Target
JC_30332892b06801b7aa8b2721fcbb140fa68ef32f460b6d7ca961f0a77aa6568a
-
Size
10.9MB
-
MD5
5ce03efcd982f3115092e47965ca4517
-
SHA1
cef6a0793b0916f9087a33d73244147c540b4081
-
SHA256
30332892b06801b7aa8b2721fcbb140fa68ef32f460b6d7ca961f0a77aa6568a
-
SHA512
4d1f35575c3b434da8ea6428e20aa85e22ed0b9094ba61d00c1910b2acc44c82de82fb2317dfb68e716a15ecf461ea06b5fd01dad9dce5445c7f2d0bad764876
-
SSDEEP
196608:N6pH5G0CaWgrdpQEO+MDIj6AYtRYuOhhsWnIZGSF7CZF1ttWKx:N6l5IaWqSE2tu6WIrgvtWKx
Malware Config
Signatures
-
resource yara_rule sample aspack_v212_v242 -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource JC_30332892b06801b7aa8b2721fcbb140fa68ef32f460b6d7ca961f0a77aa6568a
Files
-
JC_30332892b06801b7aa8b2721fcbb140fa68ef32f460b6d7ca961f0a77aa6568a.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 53KB - Virtual size: 96KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 6KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 9.1MB - Virtual size: 13.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
..I4 Size: 263KB - Virtual size: 268KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.U8( Size: 88KB - Virtual size: 112KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 268KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.aspack Size: 269KB - Virtual size: 272KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE