Behavioral task
behavioral1
Sample
14b5e8540c6507cc0c7c6ff44d96a22e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
14b5e8540c6507cc0c7c6ff44d96a22e.exe
Resource
win10v2004-20231215-en
General
-
Target
14b5e8540c6507cc0c7c6ff44d96a22e
-
Size
130KB
-
MD5
14b5e8540c6507cc0c7c6ff44d96a22e
-
SHA1
650c7e13c95edaa7a429e9506a83d5e02c88a490
-
SHA256
8ac8e278b9af5f1ea54c15174455af1358e89aca3717f9c72ea8459e91f9b213
-
SHA512
686fc3326ceb2c45a74fa71f7379fa23222f0a8ec9693e490adc49e6ee12bde1628b2ef833b4458149a4ee891e5a692f0c59440ad7beb2b55e92bc2ce7b0a3bb
-
SSDEEP
3072:1H9X+UOGa1Qr56QVbaxM6WJZsuyY7yVeG:1p+UO6lneSFZsj6yJ
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 14b5e8540c6507cc0c7c6ff44d96a22e unpack001/out.upx
Files
-
14b5e8540c6507cc0c7c6ff44d96a22e.exe windows:10 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 180KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 127KB - Virtual size: 128KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:10 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.code Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 116KB - Virtual size: 120KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rdata Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 124KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ