Static task
static1
Behavioral task
behavioral1
Sample
ad5813385e91eb2092302270d3c4c41acfe6078b78f0e0adf522cf04d40e4943.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
ad5813385e91eb2092302270d3c4c41acfe6078b78f0e0adf522cf04d40e4943.exe
Resource
win10v2004-20240709-en
General
-
Target
ad5813385e91eb2092302270d3c4c41acfe6078b78f0e0adf522cf04d40e4943
-
Size
712KB
-
MD5
7a33bf1c29d5f150ab5c7b2e0b4d90e2
-
SHA1
adb31c8499eb50a7c2fb03b133c9837bbe362f99
-
SHA256
ad5813385e91eb2092302270d3c4c41acfe6078b78f0e0adf522cf04d40e4943
-
SHA512
52d432e8b85c5d3784039f7c829f735177ec654af8b31f700b28d022142cfb0afb91f5d0362dca2c27746e51547a64f913a5245c859992112abd506c47b7c42c
-
SSDEEP
12288:C0/XebtG2uzZGMyJf0TLnzlZqJ3ERD/AXRcJzzh4ApKH1hnnRx+J:5XeZG2uzZhyJfUpZ03EVPTpKH1hnnRxi
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ad5813385e91eb2092302270d3c4c41acfe6078b78f0e0adf522cf04d40e4943
Files
-
ad5813385e91eb2092302270d3c4c41acfe6078b78f0e0adf522cf04d40e4943.exe windows:1 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: 607KB - Virtual size: 606KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 5KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 10KB - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 8B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: - Virtual size: 34KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 89KB - Virtual size: 89KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE