Static task
static1
Behavioral task
behavioral1
Sample
7c35dc7c44b37804c29397188f37e55fee54df871d5dc017fc8e4953db9d1a15.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
7c35dc7c44b37804c29397188f37e55fee54df871d5dc017fc8e4953db9d1a15.exe
Resource
win10v2004-20231023-en
General
-
Target
7c35dc7c44b37804c29397188f37e55fee54df871d5dc017fc8e4953db9d1a15.exe.zip
-
Size
7.9MB
-
MD5
055b7355170b3e3044540c27ec2551ca
-
SHA1
ec2914e3290091991e31a4d1d2966e1a0ac70e43
-
SHA256
da2ee38723cc8500e3113ddbcff3b2c20a0d218a93d49eb10d298230a55c7148
-
SHA512
a64e72f6ce5bedd8992d8739c03ef6bdb0f1842508c8834d9cd6f3f234f548497dbd0862ab93cea69a70ee9850b8646574a59f3651c7cacb6b95171703c1dea2
-
SSDEEP
196608:Z8VneQNfKarxgDI6ED5gR/lbIBaEXtI+OPSHgFkqC2HYbC:yNlNj2DIX9gR/tHE9RAFkqCFC
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/7c35dc7c44b37804c29397188f37e55fee54df871d5dc017fc8e4953db9d1a15.exe
Files
-
7c35dc7c44b37804c29397188f37e55fee54df871d5dc017fc8e4953db9d1a15.exe.zip.zip
Password: infected
-
7c35dc7c44b37804c29397188f37e55fee54df871d5dc017fc8e4953db9d1a15.exe.exe windows:4 windows x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
z vZCxH Size: 63KB - Virtual size: 62KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 8.5MB - Virtual size: 8.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 88KB - Virtual size: 87KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ