Static task
static1
Behavioral task
behavioral1
Sample
7ed4a3608d710c100ed91227ebd2d967586d5b4153dd74ff0ff042464950a229.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
7ed4a3608d710c100ed91227ebd2d967586d5b4153dd74ff0ff042464950a229.exe
Resource
win10v2004-20240802-en
General
-
Target
7ed4a3608d710c100ed91227ebd2d967586d5b4153dd74ff0ff042464950a229.exe
-
Size
64KB
-
MD5
fd10521309f19d53327f085ab2cc6b4d
-
SHA1
fd5acd0011fcee27014f8210ef5689adc4c8aeca
-
SHA256
7ed4a3608d710c100ed91227ebd2d967586d5b4153dd74ff0ff042464950a229
-
SHA512
cdb953c2774f47d532d0640fda22f548ab435751bab277dc08d42b3b7d55cdfa73378590fdc61391c2acdee28e54ee540a8197a2c379f4c8b90d91e35d029afe
-
SSDEEP
1536:1iXSdgLYWcbbfMyEoP+fJ8Ta+nOSvL6RLhwLtZkHI1:qLYTbkZ2+R8T9nOSvWCrkHU
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7ed4a3608d710c100ed91227ebd2d967586d5b4153dd74ff0ff042464950a229.exe
Files
-
7ed4a3608d710c100ed91227ebd2d967586d5b4153dd74ff0ff042464950a229.exe.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 79KB - Virtual size: 2.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 2.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
puqhnkdc Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
swaoslfo Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.taggant Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE