Behavioral task
behavioral1
Sample
54aa1598a09ce83665a40905fd45f9de.exe
Resource
win7-20231215-en
General
-
Target
54aa1598a09ce83665a40905fd45f9de.bin
-
Size
52KB
-
MD5
54aa1598a09ce83665a40905fd45f9de
-
SHA1
a0bf32f4f4d2301d6a64899494f86cdddf7cd457
-
SHA256
61319ecb3eb81d4a612ae01769993db1dcfe5671e4831832f278a83683ed8713
-
SHA512
733ed106f774fed233adacdc03cbce6cdf8ae12d5be36a33aad206327d93ae0ca6253c4ff41c0967b72e27a6579c5724e50f6b1dccaa0221793c03ac2ab7a424
-
SSDEEP
1536:5GEx5CKnsaC8q305If1xkju/zrwdY/Jx4:5TPCKnsaBYy2wdYI
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 54aa1598a09ce83665a40905fd45f9de.bin
Files
-
54aa1598a09ce83665a40905fd45f9de.bin.exe windows:4 windows x86 arch:x86
91834a0af34517a83b13f67eb7c438ff
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
urlmon
MkParseDisplayNameEx
FindMediaType
WriteHitLogging
CreateURLMoniker
kernel32
CreateNamedPipeW
DisconnectNamedPipe
ExpandEnvironmentStringsW
EnumDateFormatsExW
ExpandEnvironmentStringsW
FindNextFileW
Sections
UPX0 Size: - Virtual size: 96KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 48KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE