Behavioral task
behavioral1
Sample
1252-54-0x0000000000400000-0x0000000000409000-memory.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1252-54-0x0000000000400000-0x0000000000409000-memory.exe
Resource
win10v2004-20230220-en
General
-
Target
1252-54-0x0000000000400000-0x0000000000409000-memory.dmp
-
Size
36KB
-
MD5
9ce6ca02be9028c6d7df31110bdc510d
-
SHA1
90f51bdf5cb604e67ee9b28362f9dcab06091532
-
SHA256
adb42bbf22c6f16061b9c9a84ff31c6507348469e8d81f658e75b616490c68d0
-
SHA512
b62a78d33441220ef1fcddf135d783509b08e590c2dbe14ea1bcf2095f7e873b7a7681cd5d851da30f67b13921e22d31a417e363d6c3793ffd301c0aa9b57688
-
SSDEEP
96:7xl+MbzyAW6Sxit5ZWRklDHRq6pQYY6vlXxOmCyzS+zbzyAW6Sxit5ZWRk:7x8MNWNitCklDlrOpyzLNWNitCk
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1252-54-0x0000000000400000-0x0000000000409000-memory.dmp
Files
-
1252-54-0x0000000000400000-0x0000000000409000-memory.dmp.exe windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 20KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 1KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
UPX3 Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ