Static task
static1
Behavioral task
behavioral1
Sample
407c7e945453f8b416b70eb3cab6e575833ea8082edf6f38b6f91325fa756a8f.exe
Resource
win7-20240903-en
General
-
Target
13a7ce03877b76aeae5920065b34a7ec.bin
-
Size
1.7MB
-
MD5
983654f3e886939b4f9d866e102c0787
-
SHA1
cc59136c02b50e02adb279011cfa11aa54a84f44
-
SHA256
ae2f93fb4ce90502ca8be0d3433d7df5cf2430f78ff214661a35a09f6ae818de
-
SHA512
323ac203c59b491af44f7c7beca35fc9540291ee2b322243e8df97a3b5615ae7c8156e4147c12d99adfb375f26c9ee091e9193b6ba092846910e528aafe18fd2
-
SSDEEP
24576:MXEiWNU31G6oZ8tq1MbO8gmVh7y+zOnr1gps+0jIHiLFI3SvWYWpAm4+efhAijDY:MXEijXtq1sVh7wmm+0EXi8P4bZA0GRY+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource unpack001/407c7e945453f8b416b70eb3cab6e575833ea8082edf6f38b6f91325fa756a8f.exe
Files
-
13a7ce03877b76aeae5920065b34a7ec.bin.zip
Password: infected
-
407c7e945453f8b416b70eb3cab6e575833ea8082edf6f38b6f91325fa756a8f.exe.exe windows:5 windows x86 arch:x86
2eabe9054cad5152567f0699947a2c5b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcpy
Sections
Size: 79KB - Virtual size: 2.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 2.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
rfywjrsy Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
pyumarot Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.taggant Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE