Static task
static1
Behavioral task
behavioral1
Sample
HEUR-Trojan.Win32.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
HEUR-Trojan.Win32.exe
Resource
win10v2004-20240226-en
General
-
Target
HEUR-Trojan.Win32.Generic-86c06d7e3e94ac5f071abfe16f325af425e24e33e092df6c85974dad082cd8eb
-
Size
103KB
-
MD5
62d406a8072d62535fab57d604662a17
-
SHA1
15d636e5402fd669494a7be6173bc76895e49a00
-
SHA256
86c06d7e3e94ac5f071abfe16f325af425e24e33e092df6c85974dad082cd8eb
-
SHA512
0d7616dc72c7a0b8f642712b5ece9073fc9416a66b434a19cd8e0bb0d7ed6b79f3f5b12ee3b03a5da1800fd3efeba37bae2a4df9250c8f84f73ddf1db3c1e98e
-
SSDEEP
3072:ZHXQcQlZg+6uQw4ruZv2RliS8DnSDxlCFLQK8z0v:BjBrw4ruRElASDqLp8Iv
Malware Config
Signatures
-
Detects executables built or packed with MPress PE compressor 1 IoCs
resource yara_rule sample INDICATOR_EXE_Packed_MPress -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource HEUR-Trojan.Win32.Generic-86c06d7e3e94ac5f071abfe16f325af425e24e33e092df6c85974dad082cd8eb
Files
-
HEUR-Trojan.Win32.Generic-86c06d7e3e94ac5f071abfe16f325af425e24e33e092df6c85974dad082cd8eb.exe windows:1 windows x86 arch:x86
f4077701653ae18e45c2b7d8cd1a9112
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetModuleHandleA
GetProcAddress
iphlpapi
GetAdaptersInfo
user32
GetCursorInfo
crtdll
exit
ulib
??0ARRAY@@QAE@XZ
ntdll
RtlFreeHeap
Sections
.MPRESS1 Size: 96KB - Virtual size: 152KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.MPRESS2 Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 184B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE