Static task
static1
Behavioral task
behavioral1
Sample
e4c4400e16c5744cb346a09427b08639929a581f9d0b05ccaecb9174dcf534cf.exe
Resource
win10-20231129-en
General
-
Target
e4c4400e16c5744cb346a09427b08639929a581f9d0b05ccaecb9174dcf534cf
-
Size
7.7MB
-
MD5
7eadbcaeb232e614d14881dd83adf09c
-
SHA1
453208b5407040c9161ff346fcb50a39f2d88f82
-
SHA256
e4c4400e16c5744cb346a09427b08639929a581f9d0b05ccaecb9174dcf534cf
-
SHA512
3cbb3795a9f4694179ac2f146d29f3acdff3e4890b95ac90469271a1da2ad45c736b12ebfaf38304e81f5751d091f3c0d59bcf8eafbcbdb2474f4bfb3cd78f9c
-
SSDEEP
196608:jxm5OiKmWpAKOF9s8l+VpNoy9rYM0eaOsRzj:1iKmOvOXs8gXTkj3Oazj
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e4c4400e16c5744cb346a09427b08639929a581f9d0b05ccaecb9174dcf534cf
Files
-
e4c4400e16c5744cb346a09427b08639929a581f9d0b05ccaecb9174dcf534cf.exe windows:1 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 1024B - Virtual size: 588B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 3KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 8B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 77KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ