Static task
static1
Behavioral task
behavioral1
Sample
bc034a381ef0caa647b700ac2824fe05eb8706437ef29a99d60de352a7e4ec0a.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
bc034a381ef0caa647b700ac2824fe05eb8706437ef29a99d60de352a7e4ec0a.exe
Resource
win10v2004-20240802-en
General
-
Target
bc034a381ef0caa647b700ac2824fe05eb8706437ef29a99d60de352a7e4ec0a
-
Size
64KB
-
MD5
3c043e8f576d7937f50b0838d2e13da2
-
SHA1
6e34ef2bc76bceab2115a97c3130a9bf69c96208
-
SHA256
bc034a381ef0caa647b700ac2824fe05eb8706437ef29a99d60de352a7e4ec0a
-
SHA512
0f2b72166901b2ca07e9ea6aeb175e1dcab1994a5c2798a056475aa07184c4295b64c9a6912a63b4e0349e7cce491a2fbfe3943995fe7227e6a510bfe5958761
-
SSDEEP
768:2wuS6iJViIKVI+BH05HFU63MA2bAsud2xr2N5XS+RnroQ8VNn/sVkTw3SY3d2p/o:29SnlvMAQ22xrQSoslVIN9t2L/XdZgQe
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource bc034a381ef0caa647b700ac2824fe05eb8706437ef29a99d60de352a7e4ec0a
Files
-
bc034a381ef0caa647b700ac2824fe05eb8706437ef29a99d60de352a7e4ec0a.exe windows:1 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 132KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.kofbl Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.l1 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ