Static task
static1
Behavioral task
behavioral1
Sample
79f42c41e223b1412c6ee4c7521532d65a4b2080fd571dcfbdedfab6e7bdcf65N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
79f42c41e223b1412c6ee4c7521532d65a4b2080fd571dcfbdedfab6e7bdcf65N.exe
Resource
win10v2004-20241007-en
General
-
Target
79f42c41e223b1412c6ee4c7521532d65a4b2080fd571dcfbdedfab6e7bdcf65N
-
Size
573KB
-
MD5
15aaf76c8b25309898fca05908051db0
-
SHA1
f489a45c8cb36153c0ee4b1e006262e317045965
-
SHA256
79f42c41e223b1412c6ee4c7521532d65a4b2080fd571dcfbdedfab6e7bdcf65
-
SHA512
330a67b2ea1d1b6b5fb20854c5937b5b6004702846975438331222f46eecbbbe103f00116ecd3f511d74a457387b7f1314fae10109b00ee7dc8e37a87e49562f
-
SSDEEP
6144:W0ljj2Y7VcvwDuh8WOkWAbd4nf0H05yqE6Hl0ChW0+ksllAXBu0lWGWUJJQ4t0BE:9jaGSvwDuh8Pkhym2g7XO3LWUQfh4Co
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 79f42c41e223b1412c6ee4c7521532d65a4b2080fd571dcfbdedfab6e7bdcf65N
Files
-
79f42c41e223b1412c6ee4c7521532d65a4b2080fd571dcfbdedfab6e7bdcf65N.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
Size: 20KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.petite Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE