Static task
static1
Behavioral task
behavioral1
Sample
a14d98efb427a2f880155d0f0e6c5983ad1046283ccd2503d4e6689d7852b074.exe
Resource
win7-20240708-en
General
-
Target
4a1ecd263f814b6e853f0fb85f405a79.bin
-
Size
2.0MB
-
MD5
15ea629782c4f950f1d5842ff653f513
-
SHA1
d585c58a12406cc689aa755f16c082718d97828a
-
SHA256
9ee987dec82661c24fefb273715d9c076f90e03500b540b0b21df5b432749036
-
SHA512
18f3875dfbbc443bdf26a03cb0a3b3e033ab79e7b6f05fe43672f5f644efece868d9a08c2b0d132db21ab4bb64d7308886ab504fee87cdde914329347d78a19b
-
SSDEEP
49152:2nmviE0BwJimnIS5IHH6DW8pe6YoFOLoA0pz7dVnqDx:cvHzmISWHaDLpe6YGnbHox
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/a14d98efb427a2f880155d0f0e6c5983ad1046283ccd2503d4e6689d7852b074.exe
Files
-
4a1ecd263f814b6e853f0fb85f405a79.bin.zip
Password: infected
-
a14d98efb427a2f880155d0f0e6c5983ad1046283ccd2503d4e6689d7852b074.exe.exe windows:5 windows x86 arch:x86
Password: infected
2eabe9054cad5152567f0699947a2c5b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcpy
Sections
Size: 413KB - Virtual size: 2.9MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 2.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
yhztmgac Size: 1.6MB - Virtual size: 1.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
gucrswcc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.taggant Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE