Behavioral task
behavioral1
Sample
14C749A52EAF56734222A55611A8E710C4560155B4A932342CC03E417A9D790E.exe
Resource
win7-20220812-en
General
-
Target
14C749A52EAF56734222A55611A8E710C4560155B4A932342CC03E417A9D790E
-
Size
5.1MB
-
MD5
115a7c24904eed7dba002ad271bd4635
-
SHA1
4f8d0a3a4afe7ae8fae5028907573e678bc61291
-
SHA256
14c749a52eaf56734222a55611a8e710c4560155b4a932342cc03e417a9d790e
-
SHA512
7ba1f91bac0eec0e2e597723fa5cba598f79bf8843c70af80f426f4e8ece4acb0ea390605e9ac12053bf4dafcac085d8d1fd92539f9d6f9c7d7cbbe1f2a996c8
-
SSDEEP
98304:8EQtrgPI/eqj/VkbWoXjJRPJ1f0m/yPXTbd9JrtdXuT8SO5PuZm/5:iiPQeqDGW0Zd0BXBrtd+TTePJ/5
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
14C749A52EAF56734222A55611A8E710C4560155B4A932342CC03E417A9D790E.exe windows x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: - Virtual size: 13.6MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 5.1MB - Virtual size: 5.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE