Static task
static1
Behavioral task
behavioral1
Sample
d0879650a70e9719137df83bd3b62c46d862c0203a2e66f9fb50996fd2fc4328.exe
Resource
win7-20240903-en
General
-
Target
9508667733cdf7352c5d47242eae8256.bin
-
Size
1.7MB
-
MD5
7908fc8f10f7b0c730d9f99f3da0ed7e
-
SHA1
b3ab9218599942a1f40d2b898f931aa9c2498b1d
-
SHA256
f2e5db54aae8291be817b216b154e240884f9581225fec6ad4966d3153273adb
-
SHA512
98b02b961f81ad76532afe93c63473d94e79f60310b28904e715b303d8cbb310d21938076cb4f9fb821d049c239b16150f346e951a731f676e3433f708bd14cf
-
SSDEEP
49152:Todp5jBHD3FDhP00qycLnidMHCG56Kv/U8U6PJ7:ToNBVhPitLn61cHUhA7
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/d0879650a70e9719137df83bd3b62c46d862c0203a2e66f9fb50996fd2fc4328.exe
Files
-
9508667733cdf7352c5d47242eae8256.bin.zip
Password: infected
-
d0879650a70e9719137df83bd3b62c46d862c0203a2e66f9fb50996fd2fc4328.exe.exe windows:5 windows x86 arch:x86
Password: infected
2eabe9054cad5152567f0699947a2c5b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcpy
Sections
Size: 79KB - Virtual size: 2.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 2.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ukkahpfu Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
pwmewcki Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.taggant Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE