Static task
static1
Behavioral task
behavioral1
Sample
c499eaaf969ae158153fc3f7422ab4151769c5c7464c330fac0fc4ce11e248a2.exe
Resource
win7-20240705-en
General
-
Target
8ccca6c49437c7b3d5c18ce4e6e9a0e0b6d446119cde7bf63566682e224a61aa
-
Size
1.7MB
-
MD5
8f8e6efe1fc00e8c103a9a422a9bfc02
-
SHA1
6cf7bf776c8ffba28fe753bfadae22136fddb158
-
SHA256
8ccca6c49437c7b3d5c18ce4e6e9a0e0b6d446119cde7bf63566682e224a61aa
-
SHA512
47a6b859d6c6a55f6e05b4c657dadd02b1cb9add1d70c65621e3f029dc0715c308c895b768df833d0caac93cf7857eb3e6a38ec78c67181d15ac412836690b4a
-
SSDEEP
49152:J9NPj+QLN/9YkX7HWgg88/wm8R0XZRaQGHxv:3BiiNvH298wGjxv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/c499eaaf969ae158153fc3f7422ab4151769c5c7464c330fac0fc4ce11e248a2.exe
Files
-
8ccca6c49437c7b3d5c18ce4e6e9a0e0b6d446119cde7bf63566682e224a61aa.zip
Password: infected
-
c499eaaf969ae158153fc3f7422ab4151769c5c7464c330fac0fc4ce11e248a2.exe.exe windows:5 windows x86 arch:x86
2eabe9054cad5152567f0699947a2c5b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcpy
Sections
Size: 79KB - Virtual size: 2.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 2.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
yvwooyxr Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
wzpzwqon Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.taggant Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE