Behavioral task
behavioral1
Sample
a65046964b110d7087d56139e5f46bca2c44ff9bd3a2cca8e76da0686d46e53d.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
a65046964b110d7087d56139e5f46bca2c44ff9bd3a2cca8e76da0686d46e53d.exe
Resource
win10v2004-20240226-en
General
-
Target
a65046964b110d7087d56139e5f46bca2c44ff9bd3a2cca8e76da0686d46e53d
-
Size
780KB
-
MD5
55f3cc192388632f5e1f8817a1d01b0a
-
SHA1
c4a322033c5404604a1ecd0d02f209407470d107
-
SHA256
a65046964b110d7087d56139e5f46bca2c44ff9bd3a2cca8e76da0686d46e53d
-
SHA512
50feeb04aea658fecff8d8369d123f5ba455e9b14e5bbfb624b0e92d4edd89b8880889f6045c36d83ab6275e9ef3b0eae075dcba3994a95c3cd5c87974ec83d5
-
SSDEEP
12288:ihkDgouVA2nxKkorvdRgQriDwOIxmxiZnYQE7PJcxoLiTd9:CRmJkcoQricOIQxiZY1aoLiTd9
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 1 IoCs
resource yara_rule sample UPX -
resource yara_rule sample upx -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule sample autoit_exe -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a65046964b110d7087d56139e5f46bca2c44ff9bd3a2cca8e76da0686d46e53d
Files
-
a65046964b110d7087d56139e5f46bca2c44ff9bd3a2cca8e76da0686d46e53d.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: 472KB - Virtual size: 472KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 264KB - Virtual size: 268KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 29KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.imports Size: 9KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE