Behavioral task
behavioral1
Sample
17AC1033AAEEEC2EB0A76D09B088C4FF375A2194DA3926515EE8272381AC0C33.exe
Resource
win7-20220715-en
General
-
Target
17AC1033AAEEEC2EB0A76D09B088C4FF375A2194DA3926515EE8272381AC0C33
-
Size
4.0MB
-
MD5
323bdaaa697105151fa40d0bd3b73eca
-
SHA1
4c2d4957b0188b2f9ac6366f2b8725fe4fee5140
-
SHA256
17ac1033aaeeec2eb0a76d09b088c4ff375a2194da3926515ee8272381ac0c33
-
SHA512
0db031a8704f735c493896866a11b0466716fbd2c8e3ca81542ab0c21611f7926947d9bd4933394187a98689a9f112c9a2c32a63e485639920bb62f03e202130
-
SSDEEP
98304:4AjcYeq63hOlHdF9B9VvAndvdXXJ7YLQzys:4A7eBWF9PVodvdmLQz
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
17AC1033AAEEEC2EB0A76D09B088C4FF375A2194DA3926515EE8272381AC0C33.exe windows x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: - Virtual size: 9.8MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 4.0MB - Virtual size: 4.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE