Static task
static1
Behavioral task
behavioral1
Sample
129b21aa16c120d7bfd94fb86b8a63d871c090a16735c162a14cd29aa92f6c59N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
129b21aa16c120d7bfd94fb86b8a63d871c090a16735c162a14cd29aa92f6c59N.exe
Resource
win10v2004-20240802-en
General
-
Target
129b21aa16c120d7bfd94fb86b8a63d871c090a16735c162a14cd29aa92f6c59N
-
Size
131KB
-
MD5
f181264b7399e59d95a8d37751f20640
-
SHA1
70c1ca72af86a1d1d0ccfecf0fac858015aab868
-
SHA256
129b21aa16c120d7bfd94fb86b8a63d871c090a16735c162a14cd29aa92f6c59
-
SHA512
3c7587c56ead9494fdc33b6dd3058953a7cfde9d1b146012a5eb00c2efabe8ab32f9227fa324c981d15feb68cc5efc7ff62d22ea8bba6631a9f989459f51eab7
-
SSDEEP
3072:+mzDb0Z4qnHuGDpZ4u966cflkMwFl1rrb1VWviBaVoGsz:rzv0Z4qnHPJMvwFbrf1V9amHz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 129b21aa16c120d7bfd94fb86b8a63d871c090a16735c162a14cd29aa92f6c59N
Files
-
129b21aa16c120d7bfd94fb86b8a63d871c090a16735c162a14cd29aa92f6c59N.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
39y2caqa Size: 37KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
3ki9lsaj Size: 5KB - Virtual size: 40KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
4h22fnvf Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 202KB - Virtual size: 7.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2.1MB - Virtual size: 2.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE