Static task
static1
Behavioral task
behavioral1
Sample
b6d4e8e108defd1bdbfccb79dd7ab963d3d18aed0482dc03dc21ef42424d2c00.exe
Resource
win7-20241010-en
General
-
Target
b6d4e8e108defd1bdbfccb79dd7ab963d3d18aed0482dc03dc21ef42424d2c00.exe
-
Size
4.1MB
-
MD5
c58f5d34befa71283f1bde52b96b3c2d
-
SHA1
280377ad5c23425b842a63d10d739b32a7bae57e
-
SHA256
b6d4e8e108defd1bdbfccb79dd7ab963d3d18aed0482dc03dc21ef42424d2c00
-
SHA512
3f245d3e253aac48bc6aa77ffdcadbedbe420353383ecab0d7c87c07d800ddd0fe1ccaf7aea9ab5bc8399053e5ad10f4ba6bdcc3a51d0acb1bef120813784153
-
SSDEEP
98304:B9Njdz3gVVo8KPTFqhcDthVheU4CJl1zR1zzRqJ2trCyTA:HLrl71nfeU4CrZzVqgt1TA
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource b6d4e8e108defd1bdbfccb79dd7ab963d3d18aed0482dc03dc21ef42424d2c00.exe
Files
-
b6d4e8e108defd1bdbfccb79dd7ab963d3d18aed0482dc03dc21ef42424d2c00.exe.exe windows:4 windows x86 arch:x86
2eabe9054cad5152567f0699947a2c5b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
lstrcpy
Sections
Size: 2.5MB - Virtual size: 7.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 3.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
yxbxwyfo Size: 1.7MB - Virtual size: 1.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
lkwsrdws Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.taggant Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE