Behavioral task
behavioral1
Sample
e01425236afab1c19c318350cecccc56.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e01425236afab1c19c318350cecccc56.exe
Resource
win10v2004-20240226-en
General
-
Target
e01425236afab1c19c318350cecccc56
-
Size
7KB
-
MD5
e01425236afab1c19c318350cecccc56
-
SHA1
af874eea3baad9d42af5a1a940909523d49da887
-
SHA256
ef4ac11ad5bb16671c937fc86fcb83930b4a6105b4a827f416f55787665f0b11
-
SHA512
3bfbc433c21bb642954600c83724fb96b2b7ea21edd99a5a182e31be0e679f5848dc75dbf8281293fa459d01b8a39aeb8c649e1634e33c39cb9bd7d3e22caec8
-
SSDEEP
192:I2ckmX299alFnTEE1i1Q0kZx5zrfVddvv+Q:ItkmX2TazTENyVrfVddXJ
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource e01425236afab1c19c318350cecccc56
Files
-
e01425236afab1c19c318350cecccc56.exe windows:4 windows x86 arch:x86
b46ead522a346c3a0732882852f5cd15
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
GetProcAddress
LoadLibraryA
user32
GetDlgItem
Sections
UPX0 Size: - Virtual size: 20KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 2KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE