Static task
static1
Behavioral task
behavioral1
Sample
4ee286850a22b21fe26d0b066172361d29569f2bae63bee1a61605cf79b7852e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
4ee286850a22b21fe26d0b066172361d29569f2bae63bee1a61605cf79b7852e.exe
Resource
win10v2004-20240226-en
General
-
Target
4ee286850a22b21fe26d0b066172361d29569f2bae63bee1a61605cf79b7852e
-
Size
472KB
-
MD5
9f6099a3266e4e836c665c1e340d8c1f
-
SHA1
53cb409e7f52a8cae973e0fe69a7c4ee0c67c191
-
SHA256
4ee286850a22b21fe26d0b066172361d29569f2bae63bee1a61605cf79b7852e
-
SHA512
29cc58e10b1027047ae168e6c54d304e20a1f7c2851b6770084a746e36b4ad090931980ab4b240f9b5aaaab1d3b8fe42231c138bb1ae52c085add1bb9479847d
-
SSDEEP
6144:cf+Jjjou35J6i5plrzuo6/LkeYvjoIHnv0RX/VwFdLD/7MsrYMC+9GXL9M8sG3d6:bj8u3ui5pl+uBvc/V0FdYxJdRqMe
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 4ee286850a22b21fe26d0b066172361d29569f2bae63bee1a61605cf79b7852e
Files
-
4ee286850a22b21fe26d0b066172361d29569f2bae63bee1a61605cf79b7852e.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: 402KB - Virtual size: 402KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
DATA Size: 7KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 7KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 16B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE