Static task
static1
Behavioral task
behavioral1
Sample
ead6067f90a3f1018b6986d1a99f5e57222324f4fe892756c7547603cf79e884.exe
Resource
win10v2004-20240802-en
General
-
Target
ead6067f90a3f1018b6986d1a99f5e57222324f4fe892756c7547603cf79e884
-
Size
1.8MB
-
MD5
235e3c9d8ccd2ce95aeca8a1ff1396ea
-
SHA1
3938efcf02c06641867ed815a237e919ad30b0af
-
SHA256
ead6067f90a3f1018b6986d1a99f5e57222324f4fe892756c7547603cf79e884
-
SHA512
488f497d0d28b40a23f37293931c8edf2812e1e9a817f2da281fbda337e6c6ed4cd5d2e08a2cb8a95aadc1b5fdb870a9dc482acf5c4ff7b12e14566fe4f6d0a4
-
SSDEEP
49152:mDAspo22EBZAoY1FuGh/62X9bBED864i:mD/XvB2oYZ62xuD8Li
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource ead6067f90a3f1018b6986d1a99f5e57222324f4fe892756c7547603cf79e884
Files
-
ead6067f90a3f1018b6986d1a99f5e57222324f4fe892756c7547603cf79e884.exe windows:6 windows x86 arch:x86
2eabe9054cad5152567f0699947a2c5b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcpy
Sections
Size: 183KB - Virtual size: 416KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 2.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
pfihxcci Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
znxoblku Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.taggant Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE