Behavioral task
behavioral1
Sample
143723e47a943ae05939d21105d401dd.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
143723e47a943ae05939d21105d401dd.exe
Resource
win10v2004-20231215-en
General
-
Target
143723e47a943ae05939d21105d401dd
-
Size
30KB
-
MD5
143723e47a943ae05939d21105d401dd
-
SHA1
fd1401acbcf4f4bffed2fca580b08f13418c56d2
-
SHA256
e44a112cfcc721fed18fa56082327f87a6147e391bf1edc62cb963054dc03b65
-
SHA512
6d136bd89e85e446da131c53d9e4b9430dd87cce5a41c5c619bf6e9d98d9badb79c67ebbd09453338db7f8df769d788343e7207371ec5a7f36d5d16cef6c3dbd
-
SSDEEP
768:qz4E3QuxB8eoGlmH4xFPGPeiatWXBnZfjXwA9NlpY:G4EzWpGUH4numLSB68DpY
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 143723e47a943ae05939d21105d401dd unpack001/out.upx
Files
-
143723e47a943ae05939d21105d401dd.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 44KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 18KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.rdata Size: 3KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 14KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 21KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ