_crt_debugger_hook
Behavioral task
behavioral1
Sample
cae651db6d4d39ab5e454094ed11f6c3.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
cae651db6d4d39ab5e454094ed11f6c3.exe
Resource
win10v2004-20240226-en
General
-
Target
cae651db6d4d39ab5e454094ed11f6c3
-
Size
65KB
-
MD5
cae651db6d4d39ab5e454094ed11f6c3
-
SHA1
25492d31da00779ee8dd6dffcb7f8ced2395b0a2
-
SHA256
9b5b1b2f89712217b20d7a8f02ac331c703a0b50076d1e76960419b88fee9635
-
SHA512
e0de7770140a322f412e1406bced8cc7f16dc18922b7dbbcf5da1ae16976abf4142a8e5446cab5362e0ab2964633b455d85a278d8932bbec8ab380419eb2db35
-
SSDEEP
1536:UeGQ7Dka6912va7VSygpQIVKghgV6SgK:TGQ/O1v7VSJQsa8
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource cae651db6d4d39ab5e454094ed11f6c3 unpack001/out.upx
Files
-
cae651db6d4d39ab5e454094ed11f6c3.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 63KB - Virtual size: 64KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Exports
Exports
Sections
.text Size: 74KB - Virtual size: 73KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 33KB - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 1KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ