Static task
static1
Behavioral task
behavioral1
Sample
1aeeb023a15593ed33dca66d764950fc516f52ffa4a447406a4e2d413c9ee4f7.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
1aeeb023a15593ed33dca66d764950fc516f52ffa4a447406a4e2d413c9ee4f7.exe
Resource
win10v2004-20240802-en
General
-
Target
1aeeb023a15593ed33dca66d764950fc516f52ffa4a447406a4e2d413c9ee4f7
-
Size
3.8MB
-
MD5
d5dd460969d43f03a667d9a333344a72
-
SHA1
70103873162b312058ebf24c0014efeed45e522f
-
SHA256
1aeeb023a15593ed33dca66d764950fc516f52ffa4a447406a4e2d413c9ee4f7
-
SHA512
481d5147267a39d626b80d89dbcbd7779f9df1993ff80b01511b6b3cb9f9a39fd641eb0e35c811b57caf35aa3406cd36d6c862ae6b54313deb59c41689a0a1f4
-
SSDEEP
98304:WMjukn8ETrbF/XGaYn2KpLNkO9v9uo7fl3/MBMo2Hs:f6S8E7F1YnbLz9Dfln
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1aeeb023a15593ed33dca66d764950fc516f52ffa4a447406a4e2d413c9ee4f7
Files
-
1aeeb023a15593ed33dca66d764950fc516f52ffa4a447406a4e2d413c9ee4f7.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 448KB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Size: 42KB - Virtual size: 172KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 6KB - Virtual size: 31KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 17KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.idata Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.winlice Size: - Virtual size: 5.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.boot Size: 3.3MB - Virtual size: 3.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ