Behavioral task
behavioral1
Sample
CEB347EB751265CF60634B7D017FEEA6665A78AE17EC1E51DDECEE791662DD71.exe
Resource
win7-20220718-en
General
-
Target
CEB347EB751265CF60634B7D017FEEA6665A78AE17EC1E51DDECEE791662DD71
-
Size
4.0MB
-
MD5
23e195e5f5a1d168b084c5ba124dfb47
-
SHA1
302ebac608b9ca82f2780f354e70c4628e325190
-
SHA256
ceb347eb751265cf60634b7d017feea6665a78ae17ec1e51ddecee791662dd71
-
SHA512
d5c46958033ccdf063abc354e5b6b513ea1520ed6bf1b0550d53854ddfc86d3954a2b0290284fc55acb412be4151ba72caf172677a9892d14999d633dacad6a3
-
SSDEEP
98304:CQOfnk6xg/E8+/EcqwkoIwwvL3pelhfbb/WKo2wQLOf+f:CVNg/8EikoI3pmcKIQLOf+f
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
CEB347EB751265CF60634B7D017FEEA6665A78AE17EC1E51DDECEE791662DD71.exe windows x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: - Virtual size: 9.8MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 4.0MB - Virtual size: 4.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE