Behavioral task
behavioral1
Sample
d4e314106ab9c33af0e9334247221c96.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d4e314106ab9c33af0e9334247221c96.exe
Resource
win10v2004-20240226-en
General
-
Target
d4e314106ab9c33af0e9334247221c96
-
Size
186KB
-
MD5
d4e314106ab9c33af0e9334247221c96
-
SHA1
612537c9aa5ed30719c3a493e330bad048ce0892
-
SHA256
7e736875d1f0f18d87bba9d5deaf4dc879459a1bc75565220c950bb26fea6455
-
SHA512
911bfafec56b91c3be2b0f89ee78c660eb270038603106fae224e9f63e38393f9d3ed7a4f1309b6fad67c66b2b4e634804da6eeccc2a522ec6cb9efe98f34111
-
SSDEEP
3072:6iaeY8yngRHQPdEOF0RS8CFwCeyOalkFndIIPNCJ2yZZ3sBppn:6iM8yiQ5b8ClGalkY8Nqxj3Opp
Malware Config
Signatures
-
resource yara_rule sample aspack_v212_v242 -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d4e314106ab9c33af0e9334247221c96
Files
-
d4e314106ab9c33af0e9334247221c96.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.sdata Size: 1024B - Virtual size: 204KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ygxf Size: 512B - Virtual size: 52KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 5KB - Virtual size: 160KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 163KB - Virtual size: 172KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 7KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.aspack Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE