Static task
static1
Behavioral task
behavioral1
Sample
HEUR-Trojan.Win32.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
HEUR-Trojan.Win32.exe
Resource
win10v2004-20240226-en
General
-
Target
HEUR-Trojan.Win32.Generic-4905892730054b2a1ff0110e3f45d74ea5a033f05ca5de39b5013152b93eadbd
-
Size
150KB
-
MD5
93424a1646b939611117fcc4a3b4417d
-
SHA1
3168544c913894dfdf6b84f72c5f528a325ab908
-
SHA256
4905892730054b2a1ff0110e3f45d74ea5a033f05ca5de39b5013152b93eadbd
-
SHA512
b24d945d70a56dfeb0aa62ee8736ff64db3004035f001896d128d63e5d88335de6fbe0b8e08a06888a3d8a025bdc62cfb9ebd344ae3f088dd10d512b5bbe6e2b
-
SSDEEP
3072:ge6FFhMinon+m7Of18tZ9PHnF+orVd/WDbf2k+nOkxCu665S2:lWpcrPHnf0+vxCb6V
Malware Config
Signatures
-
Detects executables built or packed with MPress PE compressor 1 IoCs
resource yara_rule sample INDICATOR_EXE_Packed_MPress -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource HEUR-Trojan.Win32.Generic-4905892730054b2a1ff0110e3f45d74ea5a033f05ca5de39b5013152b93eadbd
Files
-
HEUR-Trojan.Win32.Generic-4905892730054b2a1ff0110e3f45d74ea5a033f05ca5de39b5013152b93eadbd.exe windows:5 windows x86 arch:x86
5ccca216c3d9b7e8b28e8995df58be90
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetModuleHandleA
GetProcAddress
user32
LoadIconA
advapi32
RegCloseKey
shell32
SHGetMalloc
ole32
CoInitialize
shlwapi
PathRemoveBlanksW
msvcrt
exit
Sections
.MPRESS1 Size: 143KB - Virtual size: 360KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.MPRESS2 Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 552B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE