Behavioral task
behavioral1
Sample
HEUR-Trojan-Dropper.Win32.Daws.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
HEUR-Trojan-Dropper.Win32.Daws.exe
Resource
win10v2004-20240226-en
General
-
Target
HEUR-Trojan-Dropper.Win32.Daws.gen-7242376ed7148fa0784b8eab50b52665c7add60cbe457ae78514c2630e18fa65
-
Size
452KB
-
MD5
399aa163aaa1e56e9f205ce99b037fa9
-
SHA1
e4f404c896c6f5751cc57c3de277cbbb8db80c38
-
SHA256
7242376ed7148fa0784b8eab50b52665c7add60cbe457ae78514c2630e18fa65
-
SHA512
4c683799d7a3d2578492f4f7af4612a51c1b4c9731b83a25666de52a7da0e53ead3e362cd885a38c9d3c38e770076ed6fd788227ea9024aca1003a31f7545dfa
-
SSDEEP
6144:8kLYyvZFsjpHQvXrlHyJzVJot3aERiLTwEYYxNdZ:8kLYyourOWaE0TGY
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource HEUR-Trojan-Dropper.Win32.Daws.gen-7242376ed7148fa0784b8eab50b52665c7add60cbe457ae78514c2630e18fa65
Files
-
HEUR-Trojan-Dropper.Win32.Daws.gen-7242376ed7148fa0784b8eab50b52665c7add60cbe457ae78514c2630e18fa65.exe windows:1 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
IMAGE_FILE_BYTES_REVERSED_HI
Sections
UPX0 Size: 216KB - Virtual size: 216KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 123KB - Virtual size: 124KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 14KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.imports Size: 6KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 17KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE