Static task
static1
Behavioral task
behavioral1
Sample
172822565c712e17368a3a3dc6cd669175c77fad44a2b1376c2ead62348d67ae.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
172822565c712e17368a3a3dc6cd669175c77fad44a2b1376c2ead62348d67ae.exe
Resource
win10v2004-20240802-en
General
-
Target
172822565c712e17368a3a3dc6cd669175c77fad44a2b1376c2ead62348d67ae
-
Size
64KB
-
MD5
bc17218585ffd861dbefcb688876dea3
-
SHA1
6e2c175babe9761cc543e113e054c1300e9ac197
-
SHA256
172822565c712e17368a3a3dc6cd669175c77fad44a2b1376c2ead62348d67ae
-
SHA512
69623b95cf3cccf9e51232575446b5ba5220f5ce359df9993576928176dff579eac1d9db35ae18457ad0c3a35d8bce0aa60cc6fdbafb9e6fc8150fa1f74df471
-
SSDEEP
768:wufsPHWhGLNkJ0PpoYnYKUMy0MBn7AfmFxz134ra6D92qMqf/1H5hIXdnhKJDrY2:7eWhG60BHngTBo2655vlKYE8Rm0Z
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 172822565c712e17368a3a3dc6cd669175c77fad44a2b1376c2ead62348d67ae
Files
-
172822565c712e17368a3a3dc6cd669175c77fad44a2b1376c2ead62348d67ae.exe windows:1 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.bss Size: - Virtual size: 132KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.jfbbql Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.l1 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ