Behavioral task
behavioral1
Sample
d7362d9d4e65c671705392b33827bdbbccdfd6e4ab7660d31b8b7b5e9eedde2b.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d7362d9d4e65c671705392b33827bdbbccdfd6e4ab7660d31b8b7b5e9eedde2b.exe
Resource
win10v2004-20240508-en
General
-
Target
d7362d9d4e65c671705392b33827bdbbccdfd6e4ab7660d31b8b7b5e9eedde2b
-
Size
2.7MB
-
MD5
691dbf92beda5047ac2c8880367cf2d6
-
SHA1
7934e11dbd422f09041553977dd674e3d58eb3cb
-
SHA256
d7362d9d4e65c671705392b33827bdbbccdfd6e4ab7660d31b8b7b5e9eedde2b
-
SHA512
278a218f918940ec8f64b6b136c701c4c24c52d8bf55dc24e8591561523ee3f17f1f00d5ab5f389a434b1a6819eb3ca5b89f9f3f11bd4827c0a2be5b60649326
-
SSDEEP
49152:DmNtLJvmmwkjHqCpzxYhKdpIE85avHIsIXCMh0Lnfh29vZXRDy8FqlU6x4/:DQLYfkLljJ7IE84vosQh0ThUpFYUT
Malware Config
Signatures
-
resource yara_rule sample themida -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d7362d9d4e65c671705392b33827bdbbccdfd6e4ab7660d31b8b7b5e9eedde2b
Files
-
d7362d9d4e65c671705392b33827bdbbccdfd6e4ab7660d31b8b7b5e9eedde2b.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 289KB - Virtual size: 539KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Size: 25KB - Virtual size: 106KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 21KB - Virtual size: 134KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 8KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.imports Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.themida Size: - Virtual size: 3.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.boot Size: 2.3MB - Virtual size: 2.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ