Behavioral task
behavioral1
Sample
04227fc20f23003a281f768c2fedc93b.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
04227fc20f23003a281f768c2fedc93b.exe
Resource
win10v2004-20231222-en
General
-
Target
04227fc20f23003a281f768c2fedc93b
-
Size
130KB
-
MD5
04227fc20f23003a281f768c2fedc93b
-
SHA1
0db81a6b6ef4ca70f8273f82ad4e1854b596fcf1
-
SHA256
eca69309c5e1bbba255ab7e9ee2fb8aaa583fe4ff0b56ef2d3bfaf3baa8fc60e
-
SHA512
20140b5cc3a385702402b6a113be57a77e1ae5216dbc0fb82b46bf92d91c35375c4dd93e1d882af8825af2c0630d377dae81db641e425875e17c9aeab8c006ca
-
SSDEEP
3072:Yib3FYlqLyEwzkriv+TX1RYsS7Iodh7Nf3Fq2B:xb3FOqLakrvTX1RYs6IoL7NvFq2B
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 04227fc20f23003a281f768c2fedc93b unpack001/out.upx
Files
-
04227fc20f23003a281f768c2fedc93b.exe windows:5 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 176KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 127KB - Virtual size: 128KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:5 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 48KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 116KB - Virtual size: 120KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 124KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ