Behavioral task
behavioral1
Sample
3dccb697430738514b2c2007ba63b105.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3dccb697430738514b2c2007ba63b105.exe
Resource
win10v2004-20231215-en
General
-
Target
3dccb697430738514b2c2007ba63b105
-
Size
7KB
-
MD5
3dccb697430738514b2c2007ba63b105
-
SHA1
cb696063645e98a268e2f6cdca57f45e54a68e0b
-
SHA256
ec8b14a11f69386c5af1d2750e4753031e8a76ddef70e7bcb0ab82577e92fdb4
-
SHA512
2fe06b1315e2dc9d19d4afd2837da871a06fe2f26cf1b342921e4b75df1125bc45e9f1eeaffd510faf4057e527a130289ea76aaefa331021593920b07823211d
-
SSDEEP
192:foa0AsQTt/t8LeUJ/ITpvObkfDVlTVGstPU/:wLAXH8K8gObkh3PU/
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3dccb697430738514b2c2007ba63b105
Files
-
3dccb697430738514b2c2007ba63b105.exe windows:4 windows x86 arch:x86
2e44cfc71d5ba99dd6dedb0e2f43d741
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EnterCriticalSection
FindResourceExA
user32
GetDlgItemInt
Sections
UPX0 Size: - Virtual size: 20KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 2KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE