Static task
static1
Behavioral task
behavioral1
Sample
121489439994d4f82dcf1b397aa0d6dc11d47f1f86afddb0cb5e588020acc717.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
121489439994d4f82dcf1b397aa0d6dc11d47f1f86afddb0cb5e588020acc717.exe
Resource
win10v2004-20240611-en
General
-
Target
121489439994d4f82dcf1b397aa0d6dc11d47f1f86afddb0cb5e588020acc717
-
Size
182KB
-
MD5
81767dae23c98a56b22ea33090fb6a7e
-
SHA1
afda944a80f6378fcb48689253d10051cda2d498
-
SHA256
121489439994d4f82dcf1b397aa0d6dc11d47f1f86afddb0cb5e588020acc717
-
SHA512
a276669d4895f1baa3288a301bfb0d0c88420e7537d72a64c4d21b8d45d06724c44ac8385bc51428f93f59617021d3e4537c9739f318a75e8bfa4e867cd45ccc
-
SSDEEP
3072:ATLoAJytFCMmDR/pqqsFUCN3R9MI+QQmLRaJgj1iwQ/i4KyrPk2u5Ve4dMwOHEIR:A//ICMmDRxs3NBRZtaCj1izu+k553Re1
Malware Config
Signatures
-
Detects executables containing possible sandbox analysis VM usernames 1 IoCs
resource yara_rule sample INDICATOR_SUSPICIOUS_EXE_SandboxUserNames -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 121489439994d4f82dcf1b397aa0d6dc11d47f1f86afddb0cb5e588020acc717
Files
-
121489439994d4f82dcf1b397aa0d6dc11d47f1f86afddb0cb5e588020acc717.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 41KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 25KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE