Static task
static1
Behavioral task
behavioral1
Sample
19070f9600aa4acb963f04ea29dcbce1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
19070f9600aa4acb963f04ea29dcbce1.exe
Resource
win10v2004-20231215-en
General
-
Target
19070f9600aa4acb963f04ea29dcbce1
-
Size
495KB
-
MD5
19070f9600aa4acb963f04ea29dcbce1
-
SHA1
8f0a48ba7b53d15b5966981af1bd7023490ec3cd
-
SHA256
39dbcbc4077240f95c275209199851609d705a43274487d94c1b76ef1c05af0d
-
SHA512
48c0c68eca4d1c5db54cc56f79dfd76e45c12544657fbba0e8991c5f24d0b8997f0a5286272cf079e0b879d0c0cce6faaccadc63c4aa74795b67b7cfd3d44ea0
-
SSDEEP
6144:y14obitoC4l32qAs0DuGp5RNWnlxQv9zfOa6+8wQfK0qQLiYoqEpr46bKXNb4Tyw:yvulGLAsqpQwLO250qNLpMB0T0Iw5pTm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 19070f9600aa4acb963f04ea29dcbce1
Files
-
19070f9600aa4acb963f04ea29dcbce1.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
Size: 280KB - Virtual size: 560KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 25KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 46KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 8KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 131KB - Virtual size: 352KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: 4096.0MB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE