Behavioral task
behavioral1
Sample
40f9b7a948cd34e5e6d6fc049d333584.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
40f9b7a948cd34e5e6d6fc049d333584.exe
Resource
win10v2004-20231215-en
General
-
Target
40f9b7a948cd34e5e6d6fc049d333584
-
Size
383KB
-
MD5
40f9b7a948cd34e5e6d6fc049d333584
-
SHA1
4002e252948b4750456e948928c8222e7a53e721
-
SHA256
031b35203998dde1285c6994ef6169e664ce72d6a66134f539640213e7cea6b8
-
SHA512
64c8d80678a5d58487ec3481c1e20776bd0788567a862927f8e3ff972abda399d9bd69b6fd98af37bf5e566f2d56a6aac2f04bde6b6d1830f011f2c7a4f9631f
-
SSDEEP
6144:r6gJbaRkNJvY2k0bsRkcQRkfIwps+69yV9Goa0ixEHzBmcrBlVZU+1pn1nXllMLH:Rbm8qN0bFciRwf69GxiKTBvVZnp1z8iU
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 40f9b7a948cd34e5e6d6fc049d333584
Files
-
40f9b7a948cd34e5e6d6fc049d333584.exe windows:4 windows x86 arch:x86
f433e7fcc51e68080022754836705744
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
kernel32
GetModuleHandleA
LoadLibraryA
GetProcAddress
ExitProcess
VirtualAlloc
VirtualFree
user32
MessageBoxA
Sections
UPX0 Size: - Virtual size: 1.6MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 338KB - Virtual size: 340KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
uad6zdzv Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
uh30ptwr Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
zjsqco4i Size: - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
apmrf133 Size: 40KB - Virtual size: 44KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE