Static task
static1
Behavioral task
behavioral1
Sample
d22642fba50e49bc53fc1048c329a0aaa35baf9ec5578448a26574a1aab53f1a.exe
Resource
win7-20240708-en
General
-
Target
d22642fba50e49bc53fc1048c329a0aaa35baf9ec5578448a26574a1aab53f1a
-
Size
9.6MB
-
MD5
89b215d958b518d3eae25929a2d7e3dc
-
SHA1
77af27454c777b1f42beb2f1005bc22cc59c4a36
-
SHA256
d22642fba50e49bc53fc1048c329a0aaa35baf9ec5578448a26574a1aab53f1a
-
SHA512
14531273d23f72549f891ecf632e3c83cbc76443ca6f7e667b2e64200fa7aa844ec80cc06e6b41823c0b2c83fe045ad66ece9efe740602e4755a33505ac8ca77
-
SSDEEP
98304:lE9CKc+M8JlgKeBjAVQVol7vWWQ/g98/nejV1N8jRWohd6CbBFfc5qE3kqcdZ017:lEJcSlqaUJJ/nej6jVgCQPkVZ0EbVJQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d22642fba50e49bc53fc1048c329a0aaa35baf9ec5578448a26574a1aab53f1a
Files
-
d22642fba50e49bc53fc1048c329a0aaa35baf9ec5578448a26574a1aab53f1a.exe windows:5 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 927KB - Virtual size: 928KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 77KB - Virtual size: 280KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ezdun0 Size: 4.1MB - Virtual size: 4.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
ezdun1 Size: 2.0MB - Virtual size: 2.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 23KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.enigma1 Size: 984KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.enigma2 Size: 284KB - Virtual size: 284KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE