Static task
static1
Behavioral task
behavioral1
Sample
9677aa0ae678108ebcaf4fbb202c888b1fc9324f258755c5d0e13e700cdb465e.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
9677aa0ae678108ebcaf4fbb202c888b1fc9324f258755c5d0e13e700cdb465e.exe
Resource
win10v2004-20220414-en
General
-
Target
9677aa0ae678108ebcaf4fbb202c888b1fc9324f258755c5d0e13e700cdb465e
-
Size
2.8MB
-
MD5
b644cc5effa3145014406503c54f9229
-
SHA1
a99c5f9f855832c10214832a56dac7c6d0b60bbc
-
SHA256
9677aa0ae678108ebcaf4fbb202c888b1fc9324f258755c5d0e13e700cdb465e
-
SHA512
4a63060db979374089054f42ccad888d1f3ab8b277909ec921e701532934c2d9a67d72a166f226200fffd11e57dce9ee45837550e5bb0e8d658056ebe4870f40
-
SSDEEP
49152:yQMYSGLfgsiczFrdRKCVLx2k4BxTaFYsUjyGO8kQGZ04G7wkDdoMOe1B8q0I5vCd:yJY1LfgstztRBx8BmYTHO0GZ04G7ddeR
Malware Config
Signatures
-
Processes:
resource yara_rule sample upx
Files
-
9677aa0ae678108ebcaf4fbb202c888b1fc9324f258755c5d0e13e700cdb465e.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 3.8MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 2.8MB - Virtual size: 2.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 51KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 2.0MB - Virtual size: 2.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3.3MB - Virtual size: 3.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 836KB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 80KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ