Behavioral task
behavioral1
Sample
14d4e7d2aa93afc4ca50329f3d19ac58d79ba4137716949839e5ac974baf22e2.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
14d4e7d2aa93afc4ca50329f3d19ac58d79ba4137716949839e5ac974baf22e2.exe
Resource
win10v2004-20220901-en
General
-
Target
14d4e7d2aa93afc4ca50329f3d19ac58d79ba4137716949839e5ac974baf22e2
-
Size
197KB
-
MD5
7ba171b8eaad479ee0195be9f32b8d2c
-
SHA1
f8c672affb4346c09ac614c3861ad7baf998e3eb
-
SHA256
14d4e7d2aa93afc4ca50329f3d19ac58d79ba4137716949839e5ac974baf22e2
-
SHA512
12096d310b339b6ce0008010c3f6027f83a31e46061c2ef8ca27799b815b4c60e7805d66a5b08da97ed7e86d725d2409087871035564c8b5ddeaa82d37efe500
-
SSDEEP
3072:99kbTRHXQiquMqidd1k4ztSTUBs5DWhXyr0vw3mslqn:994RXQiZFid1LBs2c2
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
14d4e7d2aa93afc4ca50329f3d19ac58d79ba4137716949839e5ac974baf22e2.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_AGGRESIVE_WS_TRIM
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 110KB - Virtual size: 112KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE