Behavioral task
behavioral1
Sample
ca96f90b70673f09f877e23575e8c459.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
ca96f90b70673f09f877e23575e8c459.exe
Resource
win10v2004-20240226-en
General
-
Target
ca96f90b70673f09f877e23575e8c459
-
Size
16KB
-
MD5
ca96f90b70673f09f877e23575e8c459
-
SHA1
a1451d7b90935dee246c962a69e79de1edd73d14
-
SHA256
dda83c18dd7d7a814298249950bca11346d27172e4aeea18e2f4cdd8a4d19717
-
SHA512
1e23fdf4f935983e97fb6c6a53a736cf8aa24b6778f441894ba2f6947c4f27fb85c04d67ad5928a73f149afbf79def3164268a411f15b7f99a72c1a7bd8b9b1e
-
SSDEEP
384:5ahzj+P1SFBD664SVlWV+Y6vMZWjernW4eaVZ0N:5aMY6KWHEYIa6N
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ca96f90b70673f09f877e23575e8c459
Files
-
ca96f90b70673f09f877e23575e8c459.exe windows:4 windows x86 arch:x86
b46ead522a346c3a0732882852f5cd15
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
LoadLibraryA
user32
GetDlgItem
Sections
UPX0 Size: - Virtual size: 32KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE