Behavioral task
behavioral1
Sample
b87ca65199e6eba3ee9185945cbd8ee3591c15c67ad24a6a1e9a0fe98be60446.exe
Resource
win7-20240708-en
General
-
Target
b87ca65199e6eba3ee9185945cbd8ee3591c15c67ad24a6a1e9a0fe98be60446.exe
-
Size
2.7MB
-
MD5
331dcdc60c30bfb0e6caf4d5a2b13af0
-
SHA1
8791349b229c91fa0899cd0f669a9cc533aa4105
-
SHA256
b87ca65199e6eba3ee9185945cbd8ee3591c15c67ad24a6a1e9a0fe98be60446
-
SHA512
c5408605dd1fdb1f34c64eb31ef0d86685c75ddca02f78bcb762c6c799885652b3d091133fca0b0e890b3f9d0a325621d82c75cdc6c35f48bc404be109ed12e9
-
SSDEEP
49152:P9eUwdL4wRqh7YqAVpymthcNRhuvo5NMAN7q4HmfT5RhJRr0UUK81Ezw6HdPd5is:85zgSt+svYNMAN7jOhJRDrwIdb
Malware Config
Signatures
-
Processes:
resource yara_rule sample themida -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource b87ca65199e6eba3ee9185945cbd8ee3591c15c67ad24a6a1e9a0fe98be60446.exe
Files
-
b87ca65199e6eba3ee9185945cbd8ee3591c15c67ad24a6a1e9a0fe98be60446.exe.exe windows:6 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
Size: 100KB - Virtual size: 207KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
Size: 20KB - Virtual size: 54KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 1024B - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 480B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: 7KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.themida Size: - Virtual size: 4.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.boot Size: 2.6MB - Virtual size: 2.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ