Behavioral task
behavioral1
Sample
39996e07805a5c528f117260d9d621c7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
39996e07805a5c528f117260d9d621c7.exe
Resource
win10v2004-20231215-en
General
-
Target
39996e07805a5c528f117260d9d621c7
-
Size
146KB
-
MD5
39996e07805a5c528f117260d9d621c7
-
SHA1
ff5396d9396a824cd037afe0a5b61a03c2ca77b1
-
SHA256
14eb549baac466867d9854149fc5e485f32ee0f267c8a8502362484e03d61642
-
SHA512
1f85498a681aad71d2cefc2cd1f0dad05f773762df773b2e0c55072781a916cf74c0109e07c592e4b7159587fa18d8cd09bb9cd99854aaf433a8ff74c4d80df8
-
SSDEEP
3072:JXw6wZAFsdE8pWO9Lxdw83HPIpu+U0haRysFUL:JXw6hFs68p3Lx13H1VysFUL
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 39996e07805a5c528f117260d9d621c7
Files
-
39996e07805a5c528f117260d9d621c7.exe windows:4 windows x86 arch:x86
f433e7fcc51e68080022754836705744
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetModuleHandleA
LoadLibraryA
GetProcAddress
ExitProcess
VirtualAlloc
VirtualFree
user32
MessageBoxA
Sections
UPX0 Size: - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 43KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
hjohnhn9 Size: - Virtual size: 28KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
fzj3qwht Size: 35KB - Virtual size: 36KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
0niaacah Size: 66KB - Virtual size: 84KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE