Static task
static1
Behavioral task
behavioral1
Sample
72f200b10e86e1a4c4f1472fca830fa83bb45115ac60a17a70617863367fa9bf.exe
Resource
win7-20240903-en
General
-
Target
72f200b10e86e1a4c4f1472fca830fa83bb45115ac60a17a70617863367fa9bf.exe
-
Size
4.2MB
-
MD5
8009fa9b3f6b5b95575a83c2f487f515
-
SHA1
df618866e5939f420342d3fe1007f4bad31ce2aa
-
SHA256
72f200b10e86e1a4c4f1472fca830fa83bb45115ac60a17a70617863367fa9bf
-
SHA512
31be4e0e5631f6525e3312bc565348097ae7100c30312d28dafe42a647af782ac53bcc1766f91040c8ac986e70c28e98ab9a706d885c37866eadec5ccc5d41b5
-
SSDEEP
98304:MzFe3hXc4HwYlfLsIHQrFjWpamuAKapcR4es7wdCbunL:wiLHwYlQ56afOGE7wkM
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 72f200b10e86e1a4c4f1472fca830fa83bb45115ac60a17a70617863367fa9bf.exe
Files
-
72f200b10e86e1a4c4f1472fca830fa83bb45115ac60a17a70617863367fa9bf.exe.exe windows:4 windows x86 arch:x86
2eabe9054cad5152567f0699947a2c5b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
lstrcpy
Sections
Size: 2.5MB - Virtual size: 7.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 3.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ivdotsri Size: 1.7MB - Virtual size: 1.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
cxbxaeve Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.taggant Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE