Behavioral task
behavioral1
Sample
396f52cc43b9deb02c7108744dec16c44e20276a82ab40c4bd2e555e0b58d9d5.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
396f52cc43b9deb02c7108744dec16c44e20276a82ab40c4bd2e555e0b58d9d5.exe
Resource
win10v2004-20230915-en
General
-
Target
396f52cc43b9deb02c7108744dec16c44e20276a82ab40c4bd2e555e0b58d9d5
-
Size
1.5MB
-
MD5
479ee1c221c44a07a186d66f12af5af1
-
SHA1
14015614dfbbcd2c91f1079464b97185a1ecf476
-
SHA256
396f52cc43b9deb02c7108744dec16c44e20276a82ab40c4bd2e555e0b58d9d5
-
SHA512
287f4c1c478786e79524486e498cf7535db2dab930b7cd5c930ff235b191b626985977dc63a84f1fad47eb048278fc5f4af5549af8fb93e2c11769e901c4f5e7
-
SSDEEP
49152:y4DZE7mdbWHgVO1LkU4HPikKytV3BuFJyMK9gnzzRT:bDZyAVKz4HPiFCVAFgMXzzRT
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 396f52cc43b9deb02c7108744dec16c44e20276a82ab40c4bd2e555e0b58d9d5
Files
-
396f52cc43b9deb02c7108744dec16c44e20276a82ab40c4bd2e555e0b58d9d5.exe windows:4 windows x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 5.2MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 1.3MB - Virtual size: 1.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 268KB - Virtual size: 268KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE