Behavioral task
behavioral1
Sample
67a8db376b3438977898afc7c53a01c041191f7e7631c2f14945d55393286185.exe
Resource
win10v2004-20240226-en
General
-
Target
67a8db376b3438977898afc7c53a01c041191f7e7631c2f14945d55393286185
-
Size
148KB
-
MD5
7789d854c72417f4b49dcae6221348b0
-
SHA1
5d4a1f85c12db13735d924d5bee5fd65f88569e2
-
SHA256
67a8db376b3438977898afc7c53a01c041191f7e7631c2f14945d55393286185
-
SHA512
21e27ffed153cd5e70b81cfd69520316d447e91b6a5f33ddc544ed94efe4f3d1724d301335b8045a4e0997d598c02cf849a754a056021fe776893c34367a2cf9
-
SSDEEP
3072:sg5hSHWwsgcwVJ/LjOl5L4WqidIvGgPr/5:wHYTwV0r4WqidIvGgP
Malware Config
Signatures
-
Detect Xehook Payload 1 IoCs
Processes:
resource yara_rule sample xehook -
Xehook family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 67a8db376b3438977898afc7c53a01c041191f7e7631c2f14945d55393286185
Files
-
67a8db376b3438977898afc7c53a01c041191f7e7631c2f14945d55393286185.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
mscoree
_CorExeMain
Sections
.text Size: 146KB - Virtual size: 145KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 812B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ