Static task
static1
Behavioral task
behavioral1
Sample
d3395dedfa7543b614988fe0f5b6b720N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d3395dedfa7543b614988fe0f5b6b720N.exe
Resource
win10v2004-20240802-en
General
-
Target
d3395dedfa7543b614988fe0f5b6b720N
-
Size
69KB
-
MD5
d3395dedfa7543b614988fe0f5b6b720
-
SHA1
9b7d2e0882a1f13f6566a87dc139f412356dcc0f
-
SHA256
90df2d3bfab481d847e4687830747b17b6e274f5acf80e6c170eedee4e547c8e
-
SHA512
4199e75bd7ab577d99246199741aa94ceee4ed61b3286f52dd85593f0c1db29e9cc0ae67c4991edf02ff3d8bc5927a569485231dfbfd193a7e1b10412dba592b
-
SSDEEP
1536:WGfxAvozHAIx929LNyf3Julil1fAbH3NFxi2i9uznS:WGf6viAIxc9LNyRulW1fyNi2i9snS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d3395dedfa7543b614988fe0f5b6b720N
Files
-
d3395dedfa7543b614988fe0f5b6b720N.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
.text Size: 54KB - Virtual size: 54KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 144KB - Virtual size: 143KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
RES9 Size: 512B - Virtual size: 55B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
RES3 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
RES6 Size: 1024B - Virtual size: 637B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
RES7 Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
RES8 Size: 1024B - Virtual size: 828B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
RES4 Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
RES5 Size: 512B - Virtual size: 329B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ