Behavioral task
behavioral1
Sample
f16acceaef0ae8c24d8ed49928a0eab7b63bbfd11e13749d2b43321bd3c4f7cd.exe
Resource
win7-20240704-en
General
-
Target
c507dec437e09f01e4cf70dd85d478b1.zip
-
Size
5.1MB
-
MD5
fcf0c8853fcc03694ac92accc258df20
-
SHA1
cea2e245ed1fcc5fd04027ca619ca5edc420907b
-
SHA256
99b03d24ee07748e93d41bde9d4f617b9ed7cd0d9288ec0dee8199f5b981d3cf
-
SHA512
55d71bd88b267f3b007da656b715a2736da290189f9ac86ea5133a2629b899511dde4379fca8d59ce3d7cdee1dd7638fad76298f8ab958ec79f4496e93dc7dbe
-
SSDEEP
98304:47a0FW2ZLfbuyPfI38jKG3bd9DIDrJo2WjRmm79yxx5buSaTBHY8kN48e:47aY1TCwIsjHd9srsRmWQaL4te
Malware Config
Signatures
-
resource yara_rule static1/unpack001/f16acceaef0ae8c24d8ed49928a0eab7b63bbfd11e13749d2b43321bd3c4f7cd themida -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/f16acceaef0ae8c24d8ed49928a0eab7b63bbfd11e13749d2b43321bd3c4f7cd
Files
-
c507dec437e09f01e4cf70dd85d478b1.zip.zip
Password: infected
-
f16acceaef0ae8c24d8ed49928a0eab7b63bbfd11e13749d2b43321bd3c4f7cd.exe windows:4 windows x86 arch:x86
Password: infected
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 2.1MB - Virtual size: 2.8MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Size: 17KB - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 15B - Virtual size: 12B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.imports Size: 512B - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 19KB - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.themida Size: - Virtual size: 5.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.boot Size: 3.0MB - Virtual size: 3.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ