Static task
static1
Behavioral task
behavioral1
Sample
4e3607f7fe00210d7d30dcf69af1e0c945df181ce0d24702e20c3ddbd3308ec2.exe
Resource
win7-20240903-en
General
-
Target
048685b198de45adeb527f7fd57f463f.bin
-
Size
1.8MB
-
MD5
2867fa63a88937a7800b4ca3ee3492ad
-
SHA1
b34b81cffdfec71a5786aeaeb4b6384bf7cc9f0f
-
SHA256
98dea084101fb0281c5f0674dd87d4f5b17ecac316c934fa83b698dfd9f6cdf7
-
SHA512
1cbd8102d2656c8bcc98e5fc670d80e4ec47032ccaaff9806bf70082f5fcb58d19b4320a894fad5d7714454bf4901455ffa78542a70241f37b7326b9767d61b7
-
SSDEEP
49152:Uk2ikjETFDDx4rV3JJdD+jO+SaDkWurdHpdLsC:yiBdDxQDSj9gWurdHpB
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/4e3607f7fe00210d7d30dcf69af1e0c945df181ce0d24702e20c3ddbd3308ec2.exe
Files
-
048685b198de45adeb527f7fd57f463f.bin.zip
Password: infected
-
4e3607f7fe00210d7d30dcf69af1e0c945df181ce0d24702e20c3ddbd3308ec2.exe.exe windows:5 windows x86 arch:x86
Password: infected
2eabe9054cad5152567f0699947a2c5b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcpy
Sections
Size: 138KB - Virtual size: 2.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 2.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
bswmfavc Size: 1.7MB - Virtual size: 1.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
egjkgegy Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.taggant Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE