Behavioral task
behavioral1
Sample
9d7136edfd0ac296a032e5c6729818a4fab0abb7b65e394911893f5063eb047bN.exe
Resource
win7-20240729-en
General
-
Target
9d7136edfd0ac296a032e5c6729818a4fab0abb7b65e394911893f5063eb047bN
-
Size
1.7MB
-
MD5
0ac82be6ad94ed3236db987c3248b940
-
SHA1
8973d5a56dcd9345cf8c0b6e276ab48145947939
-
SHA256
9d7136edfd0ac296a032e5c6729818a4fab0abb7b65e394911893f5063eb047b
-
SHA512
e77e6b7ed04c8aa99df464ff1834a0209f59adc09fcae27a18d0250c1f3b2bd68dccebde968ef7e324877cf74b14d0aca0f9d0efb7b9dc32904c51d0e1b4d797
-
SSDEEP
49152:doWy1YRg99WZ2zCmc6RMagLKlKnNvbm18SxqI:dlyW4fCh65OhS18SxqI
Malware Config
Signatures
-
resource yara_rule sample themida -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 9d7136edfd0ac296a032e5c6729818a4fab0abb7b65e394911893f5063eb047bN
Files
-
9d7136edfd0ac296a032e5c6729818a4fab0abb7b65e394911893f5063eb047bN.exe windows:6 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
.text Size: 92KB - Virtual size: 91KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 47KB - Virtual size: 47KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 498KB - Virtual size: 503KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.pdata Size: 5KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 512B - Virtual size: 488B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.themida Size: - Virtual size: 2.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.boot Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ