Behavioral task
behavioral1
Sample
e5ee97558a85694f104b23b40a2409a7b3c6653c89cc9e1624c4b54db767d7b5.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e5ee97558a85694f104b23b40a2409a7b3c6653c89cc9e1624c4b54db767d7b5.exe
Resource
win10v2004-20220812-en
General
-
Target
e5ee97558a85694f104b23b40a2409a7b3c6653c89cc9e1624c4b54db767d7b5
-
Size
107KB
-
MD5
a013a804def94d462479cc90cf334da3
-
SHA1
0d5cbd1658d1d5fb9fdf3fd93b81dda68d0e0d78
-
SHA256
e5ee97558a85694f104b23b40a2409a7b3c6653c89cc9e1624c4b54db767d7b5
-
SHA512
ecdc2ce799a30ab6fb868d2ef67ef3caf9df2e1aaf7da1e667f96d43e3168706c8d086e2ec6d439abcec6ae6de63863dc9b3c3da2fb7e78d4ef2cb87c020e82f
-
SSDEEP
3072:pjVFAHuQ54EeLRP6mO6wSV1UeoutzTVViLweuCBcBlu1BuMP4KmR:RzUuQeL0mO8HoSWLwycc1BdwKmR
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
e5ee97558a85694f104b23b40a2409a7b3c6653c89cc9e1624c4b54db767d7b5.exe windows x86
f433e7fcc51e68080022754836705744
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
LoadLibraryA
GetProcAddress
ExitProcess
VirtualAlloc
VirtualFree
user32
MessageBoxA
Sections
UPX0 Size: - Virtual size: 92KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 42KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
9r3c389u Size: - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
m9lcbjm1 Size: 63KB - Virtual size: 64KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
e1jt720r Size: 512B - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE