Extended Key Usages
ExtKeyUsageCodeSigning
Behavioral task
behavioral1
Sample
30102024/Defender_Settings.vbs
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
30102024/Defender_Settings.vbs
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
30102024/dControl.exe
Resource
win7-20240903-en
Target
30102024.rar
Size
446KB
MD5
3426e3bc35fdca3bbf4202e7046ef109
SHA1
def0dcba3b14da1ec4549e18dd403304a7e675b5
SHA256
e44e001e305f340101bd0b72530d789640ce7914f459e5a28feb0b56082d6de2
SHA512
f142f05d961e6162849ee794d4cedbe33f988e8d85c08baf8329ad3d2e1fd61e051788fbff9e8aa4564df88e10463f27562520e9b8030a152bec88bcad207795
SSDEEP
12288:c3JfQGCZ4MZqcTTCLaS+cSN4W4rEE/huD:c3J6Z42O+cSN4W4rEghuD
AutoIT scripts compiled to PE executables.
resource | yara_rule |
---|---|
static1/unpack002/out.upx | autoit_exe |
resource | yara_rule |
---|---|
static1/unpack001/30102024/dControl.exe | upx |
Checks for missing Authenticode signature.
resource |
---|
unpack002/out.upx |
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ