Static task
static1
Behavioral task
behavioral1
Sample
0113513978946d4524b89ef52ae61fd3cbc53231dfa9215e208e3604aebfe064.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0113513978946d4524b89ef52ae61fd3cbc53231dfa9215e208e3604aebfe064.exe
Resource
win10v2004-20240426-en
General
-
Target
0113513978946d4524b89ef52ae61fd3cbc53231dfa9215e208e3604aebfe064
-
Size
8.8MB
-
MD5
03fccde42bc0796e3477dd17f179d1a1
-
SHA1
6c9a01309a56df4e1a7f231e4e92272d3be5a287
-
SHA256
0113513978946d4524b89ef52ae61fd3cbc53231dfa9215e208e3604aebfe064
-
SHA512
e8432363e002c27b7a49b97a4211d0d870f4fa3972bb28d452504936661b77f72a9e8de052355c3465e07d6a15daec248c59019347f3f588bde49380d976d479
-
SSDEEP
196608:q8O2uGHs0NSQ0kp1YhnB/wF14HYSGqJc7YU3Rli0hcIPFyTjednQoGxq:qUuGH7wLwYhqf443ZUUO0hXPYTTo9
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0113513978946d4524b89ef52ae61fd3cbc53231dfa9215e208e3604aebfe064
Files
-
0113513978946d4524b89ef52ae61fd3cbc53231dfa9215e208e3604aebfe064.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 328KB - Virtual size: 624KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Size: 24KB - Virtual size: 86KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 32KB - Virtual size: 308KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 16KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.winlice Size: - Virtual size: 14.5MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.boot Size: 8.4MB - Virtual size: 8.4MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ