Behavioral task
behavioral1
Sample
17f8ef7b31943b5647c880f7aa4e432a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
17f8ef7b31943b5647c880f7aa4e432a.exe
Resource
win10v2004-20231215-en
General
-
Target
17f8ef7b31943b5647c880f7aa4e432a
-
Size
83KB
-
MD5
17f8ef7b31943b5647c880f7aa4e432a
-
SHA1
9d9b883e52b8f729490cc9996cd097df281ca2b3
-
SHA256
1d83f74d739d9d17b1b14517bced43f653cd16eb80583f27125a69c86f69e020
-
SHA512
39c9827a1f127dde9f39ebef72b04fc1ddc863c3ef2f2c9c7e938295d7d00a6fabcc856b3980112d8902a8cc818df2653add332cd5af284ee4ddb2b37d489a19
-
SSDEEP
1536:/UtQgxhV/KqRxH75mGOLHf9RtrTxLPQEAKVqPObClQdwDDgagR97ZzPcsrHStHfv:stQg5xxbgGOTjFb96DkzPcsrWfC9E
Malware Config
Signatures
-
Patched UPX-packed file 1 IoCs
Sample is packed with UPX but required header fields are zeroed out to prevent unpacking with the default UPX tool.
resource yara_rule sample patched_upx -
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 17f8ef7b31943b5647c880f7aa4e432a
Files
-
17f8ef7b31943b5647c880f7aa4e432a.exe windows:1 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX1 Size: - Virtual size: 136KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX0 Size: 49KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 33KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE