Behavioral task
behavioral1
Sample
a5ee020839ba46412eb4e55719c397c2.exe
Resource
win7-20240221-en
General
-
Target
a5ee020839ba46412eb4e55719c397c2
-
Size
3.1MB
-
MD5
a5ee020839ba46412eb4e55719c397c2
-
SHA1
7c5e2dfbdcc13984374ee8adee0966357c90f559
-
SHA256
682078b3572553335e5a6410d5e0e3f2b6b1dbd2d32a57da31f63f1f604cbe6c
-
SHA512
258c02451079d97b1c24fa7ba35f4b9cdd253f2bf508b53d42314f1d13cc89239fad8819d8009a992c71a71585670fae4e5238eb17a982e5cde588f6f247eaf2
-
SSDEEP
98304:ddNIA2b8lIpIta0Icq+KPtYulORjiCSHwdlPtqM7RcS4FIKU21IEfrNdSf8a:ddNB4ianUstYuUR2CSHsVP8a
Malware Config
Signatures
-
Processes:
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource a5ee020839ba46412eb4e55719c397c2
Files
-
a5ee020839ba46412eb4e55719c397c2.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 4.5MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 3.1MB - Virtual size: 3.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE