Static task
static1
Behavioral task
behavioral1
Sample
efea847e29187c87fa162bb8abf60ebe811f37e239ab6686818b53d08d7c2679.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
efea847e29187c87fa162bb8abf60ebe811f37e239ab6686818b53d08d7c2679.exe
Resource
win10v2004-20240508-en
General
-
Target
efea847e29187c87fa162bb8abf60ebe811f37e239ab6686818b53d08d7c2679
-
Size
10.8MB
-
MD5
b1a2d6b1d05ffd2ca1724df174da486f
-
SHA1
0d74a7c916fc4ee151873bbcc0028ad0a711b97b
-
SHA256
efea847e29187c87fa162bb8abf60ebe811f37e239ab6686818b53d08d7c2679
-
SHA512
4e0e494d2c3227905b6561a26b512d63acb4a12a609b6ce3004cdb687fcf0ad66d3544e99dc6a9f2e5a6dce7c393d0acd1e942500d57a25de173427a344a1185
-
SSDEEP
196608:CLa6/bEEtnhwf1aDBjuiqzfyXLqkyuU4kPlyj7XFEg/BFU9vI9DMdAQCaCT0BG0E:CBbNSf1athqLyXvyuUc7VZ/5MdSNdF
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource efea847e29187c87fa162bb8abf60ebe811f37e239ab6686818b53d08d7c2679
Files
-
efea847e29187c87fa162bb8abf60ebe811f37e239ab6686818b53d08d7c2679.exe windows:4 windows x86 arch:x86
baa93d47220682c04d92f7797d9224ce
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcpy
comctl32
InitCommonControls
Sections
Size: 9.7MB - Virtual size: 48.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 4KB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
akibwavp Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
qullkftj Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE