Behavioral task
behavioral1
Sample
3f734ec747db7e5c3af5d25d40324b14f9da76da1e7f183b310027d143ef25fd.exe
Resource
win7-20220812-en
General
-
Target
3f734ec747db7e5c3af5d25d40324b14f9da76da1e7f183b310027d143ef25fd
-
Size
4.0MB
-
MD5
c81a73dcc27459903b5ff3a48b6d0c5a
-
SHA1
a45c9c2023ddbd9f78e2238e55838978980bd998
-
SHA256
3f734ec747db7e5c3af5d25d40324b14f9da76da1e7f183b310027d143ef25fd
-
SHA512
19135280538e3670314dd447141e2c1bec57fe283fb5fa560b8567b49720eded793e7b622cc6f233fc70a70aeabb5689e451ca0f054cb5e6d14d86fbf7ba2d6e
-
SSDEEP
98304:DJJYBywiF4PobmLprqcqEr4JnvxEnByep:nY64WmLynunB
Malware Config
Signatures
-
Processes:
resource yara_rule sample upx
Files
-
3f734ec747db7e5c3af5d25d40324b14f9da76da1e7f183b310027d143ef25fd.exe windows x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: - Virtual size: 9.8MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 4.0MB - Virtual size: 4.0MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE