Static task
static1
Behavioral task
behavioral1
Sample
fe01449dcb360e0a229cf326071b44910a2aa6357eff82f77af3aec9c3b9e5b6.exe
Resource
win7-20240705-en
General
-
Target
1e1be607275af8bc71fab2203e02efd5.bin
-
Size
1.8MB
-
MD5
b112d5afbfb333122ea1065c4973ba5c
-
SHA1
a868d332f7a968467029810e2dd53fe55cce91f7
-
SHA256
bfc6e6f448688932ba0d67299dbe3c9938ff3d037c5cc159fd3bd1f75754978d
-
SHA512
e6e95192a5633f0af608abf7b7c17696758ccdd87a3e9a59eccd6fa51548184fe3035477c65cd5f92591b8445b993855a5d51d5cdc7add848a4652ff9f397233
-
SSDEEP
49152:XVBSJCI/aMkJDv0wk4OXccsNVoFtP3/4w:XVqCwaMkFZhcsKP3Qw
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/fe01449dcb360e0a229cf326071b44910a2aa6357eff82f77af3aec9c3b9e5b6.exe
Files
-
1e1be607275af8bc71fab2203e02efd5.bin.zip
Password: infected
-
fe01449dcb360e0a229cf326071b44910a2aa6357eff82f77af3aec9c3b9e5b6.exe.exe windows:6 windows x86 arch:x86
Password: infected
2eabe9054cad5152567f0699947a2c5b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcpy
Sections
Size: 183KB - Virtual size: 416KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 2.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
dfvbqdiy Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
gniehxew Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.taggant Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE