F:\Office\Target\x64\ship\postc2r\x-none\msoxmled.pdb
Static task
static1
Behavioral task
behavioral1
Sample
ae0e5478b36e3d7606230d632607da80.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ae0e5478b36e3d7606230d632607da80.exe
Resource
win10v2004-20240226-en
General
-
Target
ae0e5478b36e3d7606230d632607da80
-
Size
228KB
-
MD5
ae0e5478b36e3d7606230d632607da80
-
SHA1
fe8eb557efc91430e2ce1b49fa1476e8a4950727
-
SHA256
7737b64ca9c3854f7cc61d6cc71a99eaca5e58dfa96fef23f024da1a5e740049
-
SHA512
bdcabd218f4ae3fafc6d2119461c97a3f55e56960cb49df138f16350064458bfda33639e9e5d851c7d492dc3e102becb7b4f66d3b7436a6418c8de114ab309ca
-
SSDEEP
1536:DrWjlaJZxgRDdBFB8l9kYBaVJRaCAd1uhNRk98EBsTgB:DijlwPITF+lyYBa1098EGTs
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ae0e5478b36e3d7606230d632607da80
Files
-
ae0e5478b36e3d7606230d632607da80.exe windows:6 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
PDB Paths
Sections
.text Size: 30KB - Virtual size: 29KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 11KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1024B - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.tls Size: 512B - Virtual size: 9B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.c2r Size: 512B - Virtual size: 296B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 165KB - Virtual size: 164KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 244B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ