Static task
static1
Behavioral task
behavioral1
Sample
d1e5b9629978700d42b095a7f1a1526b13cf8bf679fffd1005a0daec2af21364.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
d1e5b9629978700d42b095a7f1a1526b13cf8bf679fffd1005a0daec2af21364.exe
Resource
win10v2004-20241007-en
General
-
Target
d1e5b9629978700d42b095a7f1a1526b13cf8bf679fffd1005a0daec2af21364
-
Size
7.1MB
-
MD5
ef16186ca98cac06a6f224a0c7532fd7
-
SHA1
08ef445e63e7beed27e7f1d8468e4902fa713815
-
SHA256
d1e5b9629978700d42b095a7f1a1526b13cf8bf679fffd1005a0daec2af21364
-
SHA512
eff1289310fed5635037f7ae9564e88eae67620a15d2eff19d821f8d0283380a3528b50f11dfd2bfd78ae951d3a3ce996c980fa16c5cf6336fac84c5737aed23
-
SSDEEP
49152:9ggkEaSIHYezZiNo7IcyO82MzufjWJA6ongaHLvKLA8VgbKW2llxobcJOu2Qt7YW:Smapj+os45gaHrhdw3D7nTsR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource d1e5b9629978700d42b095a7f1a1526b13cf8bf679fffd1005a0daec2af21364
Files
-
d1e5b9629978700d42b095a7f1a1526b13cf8bf679fffd1005a0daec2af21364.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
Size: 20KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.petite Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE