Behavioral task
behavioral1
Sample
776e7a2f0aed7559a338f154f4fd51e5516a1cefb06479a8e9a386da9834f4a2.exe
Resource
win7-20220901-en
General
-
Target
776e7a2f0aed7559a338f154f4fd51e5516a1cefb06479a8e9a386da9834f4a2
-
Size
707KB
-
MD5
494b1304735449c34a43536fca2fc71c
-
SHA1
43b41b08007fe42650c3d91fe6ee425fda0b4e2f
-
SHA256
776e7a2f0aed7559a338f154f4fd51e5516a1cefb06479a8e9a386da9834f4a2
-
SHA512
7bf6902f93b809b51c5ea5340b032a5649d769bc71dad28d6b2a64fefd5a02ead5a9ff4f22f5136357b958c60009d950b210250ade95ad2e071cdb24d377e4d1
-
SSDEEP
12288:JoL0Xj4ONZJKjzzb1hKkbyw2hObnmBMqTz0b/GJhVicFyU/Y1rPDBeBZ:JdsWsrZH+wFDmBMqTQIFF3/0LD0B
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
776e7a2f0aed7559a338f154f4fd51e5516a1cefb06479a8e9a386da9834f4a2.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 320KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 651KB - Virtual size: 652KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 55KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 260KB - Virtual size: 259KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 67KB - Virtual size: 67KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 48KB - Virtual size: 77KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 500KB - Virtual size: 500KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 37KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ