Static task
static1
Behavioral task
behavioral1
Sample
d4eb7b9d4205124095008b1a75a2edd49a96bfc4e21a356141c5cd4578e252cbN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d4eb7b9d4205124095008b1a75a2edd49a96bfc4e21a356141c5cd4578e252cbN.exe
Resource
win10v2004-20241007-en
General
-
Target
d4eb7b9d4205124095008b1a75a2edd49a96bfc4e21a356141c5cd4578e252cbN
-
Size
2.2MB
-
MD5
8051000b652f72977b4a02524e8a94c0
-
SHA1
8ee73c14a537ecc12a5da488b84ee7bbbd01a986
-
SHA256
d4eb7b9d4205124095008b1a75a2edd49a96bfc4e21a356141c5cd4578e252cb
-
SHA512
2bdc056cf3e63db19f647ec691540b57f40501f4b4008d2962633b7e2b3c4700bd8a518d7543cdb7cf272bdc7ad48d6225688e31ca4f30f66f1786493bdd3275
-
SSDEEP
49152:98KjKWQc2b1FVgbjrjxPe1pbPSQm1Flo+LjRpUlZX3pz:OKjKWQckVgtev5mnlNLbUXX3pz
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d4eb7b9d4205124095008b1a75a2edd49a96bfc4e21a356141c5cd4578e252cbN
Files
-
d4eb7b9d4205124095008b1a75a2edd49a96bfc4e21a356141c5cd4578e252cbN.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
Size: 20KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.petite Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE