Static task
static1
Behavioral task
behavioral1
Sample
e0db7d445da20f424e5399bb8305274ac818b756ca290cf48285990e52e983ac.exe
Resource
win10v2004-20240704-en
General
-
Target
e0db7d445da20f424e5399bb8305274ac818b756ca290cf48285990e52e983ac
-
Size
1.8MB
-
MD5
24a19948ff7f336a7b499931afd29fc9
-
SHA1
9a9c6850bfc1676b48a24fa9272bae21b154943b
-
SHA256
e0db7d445da20f424e5399bb8305274ac818b756ca290cf48285990e52e983ac
-
SHA512
1e02b5941aa1642201a91617ac5dd6c2442070fbda95cdb36b202ea8f6f3f05d3aff44b1d2b4997e25e43de131a186f15d541374b551073ef56c7bfbaf2d74e4
-
SSDEEP
24576:kI4HG2Anje1oVScS/uZOXpxAe6byQqyWv8QUcGJ2HoCIMHaM673i+EbK09gz389U:kvJGFk/5Ae6bLWvzUN6o5P7wT7O
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource e0db7d445da20f424e5399bb8305274ac818b756ca290cf48285990e52e983ac
Files
-
e0db7d445da20f424e5399bb8305274ac818b756ca290cf48285990e52e983ac.exe windows:6 windows x86 arch:x86
2eabe9054cad5152567f0699947a2c5b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcpy
Sections
Size: 183KB - Virtual size: 416KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 2.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
rqmegutk Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
puvftcje Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.taggant Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE