Static task
static1
Behavioral task
behavioral1
Sample
DocumentoJaneiro.exe
Resource
win7-20231215-en
General
-
Target
51902ff5210561bcf493695dc49888b6
-
Size
348KB
-
MD5
51902ff5210561bcf493695dc49888b6
-
SHA1
baf0c53298de142e11d4b0975f1818cffe2df33b
-
SHA256
8f1b6b51d1695cd539a7920001f12db0a487b133936ac2515c6ffcca695f44b2
-
SHA512
21f8959eb93338ef4642cd4ce037290c2fc09a6a87cd8751cb0e749fa68a9c692999db93e7fcfed4e8ffc376ca3b2607c66cb8e815bd184ff8ff918b6048763c
-
SSDEEP
6144:UrRvCnl+RBP23lWPyks3WjedwcjxmEqSo93cjkuRzeUE5DW+WUQsL9KdcOiTCGv:UrRKnl+RBPSuDs3t5x2ptf0eU8DW+WUX
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/DocumentoJaneiro.exe
Files
-
51902ff5210561bcf493695dc49888b6.zip
-
DocumentoJaneiro.exe.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: - Virtual size: 544KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 11KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 10KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 16B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.delete Size: 512B - Virtual size: 45KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.rsrc Size: 110KB - Virtual size: 151KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pklstb Size: 328KB - Virtual size: 343KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.relo2 Size: 512B - Virtual size: 78B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ