Static task
static1
Behavioral task
behavioral1
Sample
89475e805f01d2e52093121987c912e5a6134228af6dc0047e6bac0dae9b5b0d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
89475e805f01d2e52093121987c912e5a6134228af6dc0047e6bac0dae9b5b0d.exe
Resource
win10v2004-20240508-en
General
-
Target
89475e805f01d2e52093121987c912e5a6134228af6dc0047e6bac0dae9b5b0d
-
Size
9.4MB
-
MD5
674f5e5191d2f25abf6f60dfdf57ca31
-
SHA1
b31d884354ee63ec133a8990dbc58a79ab53c584
-
SHA256
89475e805f01d2e52093121987c912e5a6134228af6dc0047e6bac0dae9b5b0d
-
SHA512
6e61000496e25e56bb6195c8a130e42aa04d1d25cde304cd3294fb1db05e0ea93e4aa0e4a52a1f8b87d16c333d082a4ee55be8b9c18d6abc5e4eaad7974904bb
-
SSDEEP
196608:8uVlqZBFGshmB5BFoOWGTjkaU6XqEKBcGl33D5ouEoAoHkh+cowMYGWbRI20:jlq/FH8BHFoOWGybxcGpFVvLkIc+YR+3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 89475e805f01d2e52093121987c912e5a6134228af6dc0047e6bac0dae9b5b0d
Files
-
89475e805f01d2e52093121987c912e5a6134228af6dc0047e6bac0dae9b5b0d.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 452KB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Size: 1.4MB - Virtual size: 3.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 44KB - Virtual size: 411KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 3.7MB - Virtual size: 3.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.winlice Size: - Virtual size: 5.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.boot Size: 3.8MB - Virtual size: 3.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ