Behavioral task
behavioral1
Sample
1ff4eb03039713853f39a54f628607a5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1ff4eb03039713853f39a54f628607a5.exe
Resource
win10v2004-20231215-en
General
-
Target
1ff4eb03039713853f39a54f628607a5
-
Size
16KB
-
MD5
1ff4eb03039713853f39a54f628607a5
-
SHA1
081c52047e8982ac36f29f7148fff3f34e80376d
-
SHA256
6e89d6e9f99e993741f6a9e06cf06526bb715412a038353562d64b1a654d2afd
-
SHA512
69367e5fd6990c7b241840bb38d37fd00e85de5b0c3cad386a0407a2248a3577d211a779b064a23be6982aec14b0fad7196912e989b4ff8d99e2a07e8d455cb4
-
SSDEEP
384:Ec/k3c/GUnSKcCJwjbsVaa3Bsxs4FVarnW4eaKicx:aSFcCqjgr3Bsq4FwINx
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 1ff4eb03039713853f39a54f628607a5
Files
-
1ff4eb03039713853f39a54f628607a5.exe windows:4 windows x86 arch:x86
b46ead522a346c3a0732882852f5cd15
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
LoadLibraryA
user32
GetDlgItem
Sections
UPX0 Size: - Virtual size: 32KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE