Static task
static1
Behavioral task
behavioral1
Sample
e473d50e389edd4ae6d0c0d00a2439a6c4ea51ae41f8f69890b4287a5c8394ff.exe
Resource
win7-20240708-en
General
-
Target
15b188d8f154e15e53731f3298651ac7.bin
-
Size
1.7MB
-
MD5
b5df38e880c5044133d68454d45cb5ac
-
SHA1
492abfeedd904bd6315feb08c4d0c3513a0c5776
-
SHA256
f63b9c83e4c77619581a2c02084c95202bcfc2925f1d98e3269a21a38c91a764
-
SHA512
3d7b4cbfbc8ccf9660fe6e11424fc5bb636a71a46cadf5b5422adee5e7a81f8702582ab53d1f8e0dc2fe9a556b8e5687a9dd4b68c7a52cabf92bd64c32434322
-
SSDEEP
49152:z7bFR0F7JZGmJnlG0eRQ3DFtRVpeNM25U182Fj4cUIsy:HbFRZUqQzFBpeNlO94cf
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/e473d50e389edd4ae6d0c0d00a2439a6c4ea51ae41f8f69890b4287a5c8394ff.exe
Files
-
15b188d8f154e15e53731f3298651ac7.bin.zip
Password: infected
-
e473d50e389edd4ae6d0c0d00a2439a6c4ea51ae41f8f69890b4287a5c8394ff.exe.exe windows:4 windows x86 arch:x86
Password: infected
2eabe9054cad5152567f0699947a2c5b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Imports
kernel32
lstrcpy
Sections
Size: 4KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 2.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
wxquhtuz Size: 1.7MB - Virtual size: 1.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
xmkmzqjx Size: 1024B - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.taggant Size: 8KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE