Behavioral task
behavioral1
Sample
7f89e3d63a0f92be2e98693b5ec31e18.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7f89e3d63a0f92be2e98693b5ec31e18.exe
Resource
win10v2004-20231215-en
General
-
Target
7f89e3d63a0f92be2e98693b5ec31e18
-
Size
12KB
-
MD5
7f89e3d63a0f92be2e98693b5ec31e18
-
SHA1
f1a271a11bd5cf35c8453a302183823fb97db22a
-
SHA256
936d6484f81a7f898ba268507cf9cf6d3dbf411cc94d5369fabf11c4ed1574b3
-
SHA512
df612a22316d526b2964748df524fe8ef45bf74817898c3f0318b20cafd232d14a6117d520bd44c91c9a82887bec202a3e8d5ceb4763775254c0624fa20147e1
-
SSDEEP
192:t4RewhPEMhF/I2AkMDgltNoENEOI/mt+5ogdXaqX7BtqKyOoOA9y02RG6Oaa/g:qrHF/I2ARgTNRNE9hha+FLo2RGxPg
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 7f89e3d63a0f92be2e98693b5ec31e18 unpack001/out.upx
Files
-
7f89e3d63a0f92be2e98693b5ec31e18.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 36KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 10KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 388B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ