Static task
static1
Behavioral task
behavioral1
Sample
9cd587e74a90f572286c6606c8d0dd40c5053aab867b5347c2499e5338a46b2d.exe
Resource
win7-20240903-en
General
-
Target
659b475361502e4bb93cb3978d0d69c6.bin
-
Size
1.8MB
-
MD5
64337e4cb1996305d88b823f930d9d7f
-
SHA1
c19876e0b66736652e0a001cfa8c920f775ce0ef
-
SHA256
fca31784bb58d1bbecbf9e28622eb85f5ccc224419124435729dd04dc94c72df
-
SHA512
890997f8e1f73554ec6975d22027c0fcd1d8895243a768bb71a029336e0a89be2901c4f218aef5b58c01e406797cd446eba3f5454763cbf36f28401b351725ea
-
SSDEEP
49152:qvp2uz2jsDRzHNHth6+RTmiqhRd/+O8jsO6ij85P:up2O2CtHj1miq1+O0EijkP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/9cd587e74a90f572286c6606c8d0dd40c5053aab867b5347c2499e5338a46b2d.exe
Files
-
659b475361502e4bb93cb3978d0d69c6.bin.zip
Password: infected
-
9cd587e74a90f572286c6606c8d0dd40c5053aab867b5347c2499e5338a46b2d.exe.exe windows:5 windows x86 arch:x86
Password: infected
2eabe9054cad5152567f0699947a2c5b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcpy
Sections
Size: 149KB - Virtual size: 4.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 37KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 2.6MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
naiczwza Size: 1.7MB - Virtual size: 1.7MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ozouvbjz Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.taggant Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE