Behavioral task
behavioral1
Sample
129e0f2f0b6d094dba48b468e4fee367d026e8d1ead997a32d952d0a6b0bc732.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
129e0f2f0b6d094dba48b468e4fee367d026e8d1ead997a32d952d0a6b0bc732.exe
Resource
win10v2004-20220812-en
General
-
Target
129e0f2f0b6d094dba48b468e4fee367d026e8d1ead997a32d952d0a6b0bc732
-
Size
4KB
-
MD5
7c13dd389588606ad471bdaa311a4f60
-
SHA1
928db1b8a2b3845ce02c911e6abdfc31cd4a2e90
-
SHA256
129e0f2f0b6d094dba48b468e4fee367d026e8d1ead997a32d952d0a6b0bc732
-
SHA512
b052e6dc07395af61cd7f5e0f8496066202020efc6a27fe8705d79f08a4c2727af548e27c1bb0da56e2943ad0f5d62db5f8f1ab6e3347b59a224efb424dcb1a2
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
129e0f2f0b6d094dba48b468e4fee367d026e8d1ead997a32d952d0a6b0bc732.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 16KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 720B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE