Static task
static1
Behavioral task
behavioral1
Sample
d7ee47972434c538f9f91491d83b34af7f50a1b386592961007e84c3fd760b17.exe
Resource
win7-20240611-en
Behavioral task
behavioral2
Sample
d7ee47972434c538f9f91491d83b34af7f50a1b386592961007e84c3fd760b17.exe
Resource
win10v2004-20240226-en
General
-
Target
d7ee47972434c538f9f91491d83b34af7f50a1b386592961007e84c3fd760b17.exe
-
Size
1.0MB
-
MD5
40e64d1fddd9143d0e462f0e1a5db4d6
-
SHA1
2dfb23d1f31eccf8f20f1c0ee8f0df059eb6d391
-
SHA256
d7ee47972434c538f9f91491d83b34af7f50a1b386592961007e84c3fd760b17
-
SHA512
3be515c2da184fdf32f94cb296b998ebe9d791b811d4fe9c58dd7abe6b3553f3ba4b1941a85ad9a1f20528c170f18cdad2a15f73949d492e87af2ce6f548e039
-
SSDEEP
24576:vSs8PPq6+mGy1gAV6zIPF7nNjOv88XJEXT/cBo7SZK5:UPC6PtgAq+F7R488X4/aomZK5
Malware Config
Signatures
-
Detects executables packed with ConfuserEx Mod 1 IoCs
resource yara_rule sample INDICATOR_EXE_Packed_ConfuserEx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d7ee47972434c538f9f91491d83b34af7f50a1b386592961007e84c3fd760b17.exe
Files
-
d7ee47972434c538f9f91491d83b34af7f50a1b386592961007e84c3fd760b17.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
mscoree
_CorExeMain
Sections
DAD8UV+ Size: 578KB - Virtual size: 577KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 486KB - Virtual size: 486KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ