Behavioral task
behavioral1
Sample
130b80d37b914d34955c535dc760d34d.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
130b80d37b914d34955c535dc760d34d.exe
Resource
win10v2004-20231215-en
General
-
Target
130b80d37b914d34955c535dc760d34d
-
Size
226KB
-
MD5
130b80d37b914d34955c535dc760d34d
-
SHA1
545fed62d1bca27eb60265d45d3a121e0cfcd9f7
-
SHA256
41b703382e2fabbe7255c72a3bf2a9a0e1b3ae689460841f6447baf80001bc6d
-
SHA512
368449b82e76b00f2fc0fe5aa02ff632bcecdd72bb1a5760cc3ec513afaad01a274ed4dad232bc7aa7f7c5df0404ef3e4fc59dae008c0c1a8f790a683e94d5cb
-
SSDEEP
6144:wMPEpzleqY1K6qFjVamFn3w9vJhbdbBUv:w5BevK6lmnAZJhbdq
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/out.upx
Files
-
130b80d37b914d34955c535dc760d34d.exe windows:4 windows x86 arch:x86
Code Sign
d0:af:1bCertificate
IssuerCN=Element Software,C=US,1.2.840.113549.1.9.1=#0c1964657640656c656d656e74736f6674776172652e636f2e756bNot Before03/09/2009, 11:09Not After03/09/2011, 11:09SubjectCN=Element Software,C=US,1.2.840.113549.1.9.1=#0c1964657640656c656d656e74736f6674776172652e636f2e756b38:25:d7:fa:f8:61:af:9e:f4:90:e7:26:b5:d6:5a:d5Certificate
IssuerCN=VeriSign Time Stamping Services CA,O=VeriSign\, Inc.,C=USNot Before15/06/2007, 00:00Not After14/06/2012, 23:59SubjectCN=VeriSign Time Stamping Services Signer - G2,O=VeriSign\, Inc.,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageDigitalSignature
KeyUsageContentCommitment
47:bf:19:95:df:8d:52:46:43:f7:db:6d:48:0d:31:a4Certificate
IssuerCN=Thawte Timestamping CA,OU=Thawte Certification,O=Thawte,L=Durbanville,ST=Western Cape,C=ZANot Before04/12/2003, 00:00Not After03/12/2013, 23:59SubjectCN=VeriSign Time Stamping Services CA,O=VeriSign\, Inc.,C=USExtended Key Usages
ExtKeyUsageTimeStamping
Key Usages
KeyUsageCertSign
KeyUsageCRLSign
3b:31:d3:65:0d:03:58:83:35:fd:14:d5:ee:b9:46:f4:2a:70:e7:a6Signer
Actual PE Digest3b:31:d3:65:0d:03:58:83:35:fd:14:d5:ee:b9:46:f4:2a:70:e7:a6Digest Algorithmsha1PE Digest MatchestrueHeaders
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 116KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 77KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 136KB - Virtual size: 132KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ