Static task
static1
Behavioral task
behavioral1
Sample
a729005d74c0cbf4cec7fc1a8b1a6fa5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
a729005d74c0cbf4cec7fc1a8b1a6fa5.exe
Resource
win10v2004-20231222-en
General
-
Target
a729005d74c0cbf4cec7fc1a8b1a6fa5.bin
-
Size
1.8MB
-
MD5
a729005d74c0cbf4cec7fc1a8b1a6fa5
-
SHA1
df9aa6ce677595d96c04fef06f5ae05b15bf1b0b
-
SHA256
bbd8463a08d0e70c418462de033120bd63b73387ac5272c181277552e01bbc39
-
SHA512
94a304e23a6a51507e6e31bdb989b3cfbe109e41e8715c2d5d9fe2739d9767a8588b1e0b8ac9d412ee61dc822817d683b2e596e019561aedcef7a7566c873484
-
SSDEEP
49152:EeGE/A6o3Tlj81Yg3DcA14VZHPLzheZA6Hz/:EeY3R8+gooKHzIAGz/
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a729005d74c0cbf4cec7fc1a8b1a6fa5.bin
Files
-
a729005d74c0cbf4cec7fc1a8b1a6fa5.bin.exe windows:6 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 492KB - Virtual size: 1.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 80KB - Virtual size: 176KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 2KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 28KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 47KB - Virtual size: 48KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 191KB - Virtual size: 2.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 993KB - Virtual size: 996KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE