Behavioral task
behavioral1
Sample
fbbc0e3624e3fbe0cedff57c1e63f17855adb1c6b9fb83db9aec86b34e537134.exe
Resource
win7-20240221-en
General
-
Target
eda1749ecd5d30aebc623e3ed3679e33.bin
-
Size
62KB
-
MD5
fd4ae3e88b42f2742b7f4a4b6d948e51
-
SHA1
cf973b850cd04e00e985031ed1c3e13bed0de297
-
SHA256
206e11f497b62d8d7b39cbbd75d62a71989db5bb700990ec03852549d84bb397
-
SHA512
a3bf624f172ae74cf0fc403457ef847f7654dfe8b21ac481fad195516aac23718018e782b861958fd20e9d559fd8f1fe430dd20e0cea26a7a2a4382474bf96fd
-
SSDEEP
1536:CKjXG/yfx7CS1suZYS1AkLzIMkLWRkT2/Bu7OLY/b13xXw:Feyf1CMsKAkXDwakypu70Y/bfA
Malware Config
Signatures
-
Detect Xehook Payload 1 IoCs
Processes:
resource yara_rule static1/unpack001/fbbc0e3624e3fbe0cedff57c1e63f17855adb1c6b9fb83db9aec86b34e537134.exe family_xehook -
Xehook family
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/fbbc0e3624e3fbe0cedff57c1e63f17855adb1c6b9fb83db9aec86b34e537134.exe
Files
-
eda1749ecd5d30aebc623e3ed3679e33.bin.zip
Password: infected
-
fbbc0e3624e3fbe0cedff57c1e63f17855adb1c6b9fb83db9aec86b34e537134.exe.exe windows:4 windows x86 arch:x86
Password: infected
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
mscoree
_CorExeMain
Sections
.text Size: 147KB - Virtual size: 147KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 812B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ