Behavioral task
behavioral1
Sample
0f7b4bdfabf21e19ce183b36db867431.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0f7b4bdfabf21e19ce183b36db867431.exe
Resource
win10v2004-20231215-en
General
-
Target
0f7b4bdfabf21e19ce183b36db867431
-
Size
27KB
-
MD5
0f7b4bdfabf21e19ce183b36db867431
-
SHA1
4ea69aadb20d117ff5611e33bf75c6eeb4457736
-
SHA256
deaaa8cd05d64d637427d0099c7d70a66e3592c8bda0589c32ea7c4bc362c62d
-
SHA512
f91b66ba08d1c394bb713d74d9c72fc478748c018444a84de18624c1b21b478eed2eb8b350abf4a71b8a86a933fb4295bd46280a9b8476ac1c8ce1898df614a3
-
SSDEEP
384:8dG6yShoKhQTejGItufLUwafWEFRysR4Um8TIgJVC/59xJgRuGQnaNSBE25:8dG6oKhLfujofWE2sR4+659xJMuLO4
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 0f7b4bdfabf21e19ce183b36db867431
Files
-
0f7b4bdfabf21e19ce183b36db867431.exe windows:4 windows x86 arch:x86
67fdc237b514ec9fab9c4500917eb60f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAlloc
Sections
UPX0 Size: - Virtual size: 192KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 21KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.1st Size: 512B - Virtual size: 192KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE