Static task
static1
Behavioral task
behavioral1
Sample
374ae1fea2d55840f2603e7cdcaf7515dc6643089f34323094427c53c3cb72a2.exe
Resource
win7-20240708-en
General
-
Target
fe0efb78a24e507da65d1ad56d4bb9ae.bin
-
Size
1.6MB
-
MD5
9288838a9cc33c5b5de029940409e941
-
SHA1
d7e6c8c1db078fa26a7f226f2be30dce0b516df5
-
SHA256
de7aab71d5d64632b17c3dc07fb6f41cc1a7c3e4a88cbd5aff537fe274a14daa
-
SHA512
92065f14485b4acf4d6ac2c2ed58e05b730562f43ce34bc7b03dc7ab2d48fd663e6c23c8b3552362157109ecde84eabdfa10e18e8ede6afce250f27f88d99d8d
-
SSDEEP
49152:9w/OaSoKshkQS0+HtZKwGAUlp67ca3f+ePJhjFr:9w/zFy0OZjSqca3tFr
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/374ae1fea2d55840f2603e7cdcaf7515dc6643089f34323094427c53c3cb72a2.exe
Files
-
fe0efb78a24e507da65d1ad56d4bb9ae.bin.zip
Password: infected
-
374ae1fea2d55840f2603e7cdcaf7515dc6643089f34323094427c53c3cb72a2.exe.exe windows:4 windows x86 arch:x86
Password: infected
2eabe9054cad5152567f0699947a2c5b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
lstrcpy
Sections
Size: 4KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 2.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ravibzsd Size: 1.6MB - Virtual size: 1.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
dxlgmonq Size: 1024B - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.taggant Size: 8KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE