Behavioral task
behavioral1
Sample
20ce4a429d0e12094d6dc8ee6bb248c9.exe
Resource
win7-20231215-en
General
-
Target
20ce4a429d0e12094d6dc8ee6bb248c9
-
Size
3.1MB
-
MD5
20ce4a429d0e12094d6dc8ee6bb248c9
-
SHA1
02afb69fdb3f964628c6d3b20c152b1498c80912
-
SHA256
cc7ad13e36e3edc44ed09ca4eef9020ddf4d2d5bc13e034e87547c942ec2e40e
-
SHA512
05a43cd70fe5ba18717bbbff10c8c556b0e3736017498a6ee24f0917f681dd535947150d2dac834184229451073a5d0fd33e7334f59f97d0b0386add588b8b78
-
SSDEEP
98304:BdNIA2b8lIpIta0Icq+KPtYulORjiCSHwdlPtqM7RcS4FIKU21IEfrNdSf8x:BdNB4ianUstYuUR2CSHsVP8x
Malware Config
Signatures
-
Processes:
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 20ce4a429d0e12094d6dc8ee6bb248c9
Files
-
20ce4a429d0e12094d6dc8ee6bb248c9.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 4.5MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 3.1MB - Virtual size: 3.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE