Static task
static1
Behavioral task
behavioral1
Sample
aux2.vmp_unknowncheats.me_.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
aux2.vmp_unknowncheats.me_.exe
Resource
win10v2004-20240802-en
General
-
Target
aux2.vmp_unknowncheats.me_.exe
-
Size
9.3MB
-
MD5
62fa02d60177ade724c8b3273de4218b
-
SHA1
c7c7e482221b364136ba002e6f464506a48fa209
-
SHA256
b142b251f8d21b91e47a1bd9595e1bf997724bc1616e88669c171b1ec3352564
-
SHA512
b03e224d11ef6760fba9c486aedfb36dea6a198df506db6857c850b55577758c2d444f332d22c33ba8e6c9ee4e2faf7a00ecce8c1b976974a7eabe00ffd4e379
-
SSDEEP
196608:oWjPuuDxAgUBh3R9MhPl5ClgTiO+Pq4wT2S0VGijVdsmRf:o02RMh7Cq4wEGij7smN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource aux2.vmp_unknowncheats.me_.exe
Files
-
aux2.vmp_unknowncheats.me_.exe.exe windows:6 windows x86 arch:x86
c4c681967a192797d18bf3b5463f04b2
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
WriteProcessMemory
Sections
.text Size: - Virtual size: 77KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: - Virtual size: 27KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.fptable Size: - Virtual size: 128B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.%8R Size: - Virtual size: 5.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.gp= Size: 512B - Virtual size: 32B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
. >n Size: 9.3MB - Virtual size: 9.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ