Behavioral task
behavioral1
Sample
AEDB009107F787D287D8C6D96AEA50F07A1E68D005D4DB4E00701D03F0E99DEC.exe
Resource
win7-20220715-en
General
-
Target
AEDB009107F787D287D8C6D96AEA50F07A1E68D005D4DB4E00701D03F0E99DEC
-
Size
4.0MB
-
MD5
ff63970655db3949bba30d372ea7732f
-
SHA1
64426330be903de91b043809b5b08301ed361528
-
SHA256
aedb009107f787d287d8c6d96aea50f07a1e68d005d4db4e00701d03f0e99dec
-
SHA512
0c33c25a253980c7f00c548b1d37ded52a379bdae48bfbb8060157dc40e4d42a2209277b38af95445d5549349e1d9cd8bbc301847f0d388c7458aa6803ae72f5
-
SSDEEP
98304:OhsGGH+1ur5KpI4j8Gy5xkJRH2lFKFo+QafR:PfD4tB12/SqafR
Malware Config
Signatures
-
Processes:
resource yara_rule sample upx
Files
-
AEDB009107F787D287D8C6D96AEA50F07A1E68D005D4DB4E00701D03F0E99DEC.exe windows x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: - Virtual size: 9.8MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 4.0MB - Virtual size: 4.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE