Static task
static1
Behavioral task
behavioral1
Sample
e4b16cb9e924633cac4f4f9454613465b132b7191db0ceaf9db50333ba7c2c33.exe
Resource
win7-20241010-en
General
-
Target
e4b16cb9e924633cac4f4f9454613465b132b7191db0ceaf9db50333ba7c2c33
-
Size
2.9MB
-
MD5
1c74e2bcb64d619589af56e34e35984f
-
SHA1
b565b12817e39b734451e91050f8c48e3183546c
-
SHA256
e4b16cb9e924633cac4f4f9454613465b132b7191db0ceaf9db50333ba7c2c33
-
SHA512
217f42cd325aa2da3e467795571e2f62f043833f842a1e9c9d0dcc291167cad4ac8d0912c540825a1cdc93735fdfac2d337f9870f039d3a9f3268d425ecfe43d
-
SSDEEP
49152:lgp487dyk6b9DjuFjZ6Op/GoPdey3TuJeBk0GhlHGy:lga+dyvb9DjuFPuoPdey3SJkk0QQ
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e4b16cb9e924633cac4f4f9454613465b132b7191db0ceaf9db50333ba7c2c33
Files
-
e4b16cb9e924633cac4f4f9454613465b132b7191db0ceaf9db50333ba7c2c33.exe windows:6 windows x86 arch:x86
2eabe9054cad5152567f0699947a2c5b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcpy
Sections
Size: 159KB - Virtual size: 352KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 832B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
pyqjlwct Size: 2.7MB - Virtual size: 2.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
grnqerss Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.taggant Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE