Static task
static1
Behavioral task
behavioral1
Sample
982cb54fe1116c332fa92c22370069b31db9fb38fc36d402cada41a258cfa013.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
982cb54fe1116c332fa92c22370069b31db9fb38fc36d402cada41a258cfa013.exe
Resource
win10v2004-20240709-en
General
-
Target
982cb54fe1116c332fa92c22370069b31db9fb38fc36d402cada41a258cfa013.exe
-
Size
230KB
-
MD5
e38c64baa2f348e37554dd4b58375b0d
-
SHA1
c763c1ade52aaa9bcdc52e81d8e9c4546fcce68c
-
SHA256
982cb54fe1116c332fa92c22370069b31db9fb38fc36d402cada41a258cfa013
-
SHA512
a36733c2b593c55fb3e3df80e38915730b8c3e7986f295c107cdc1e19d06a8b46e8926cadd417b1d06a3cef9acf5378d397853c87af40ca9db86f913ea6b08c7
-
SSDEEP
3072:QaChkxAKnrkfIPeaDsg0UFw9Tt69a3Kx5OqoBFSGCH:4CnYfSFDsg0UFw9Ttca3KfoBB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 982cb54fe1116c332fa92c22370069b31db9fb38fc36d402cada41a258cfa013.exe
Files
-
982cb54fe1116c332fa92c22370069b31db9fb38fc36d402cada41a258cfa013.exe.exe windows:4 windows x86 arch:x86
f34d5f2d4577ed6d9ceec516c1f5a744
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Imports
mscoree
_CorExeMain
Sections
aJcA+ Size: 55KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.text Size: 47KB - Virtual size: 47KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 109KB - Virtual size: 109KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 512B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
Size: 512B - Virtual size: 16B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
�^�ux Size: 16KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE