Behavioral task
behavioral1
Sample
7778e7c531eab90096c841dd23c00fca5fc06362787ebe6f6a0d93e2c54348ac.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
7778e7c531eab90096c841dd23c00fca5fc06362787ebe6f6a0d93e2c54348ac.exe
Resource
win10v2004-20240419-en
General
-
Target
7778e7c531eab90096c841dd23c00fca5fc06362787ebe6f6a0d93e2c54348ac
-
Size
1.1MB
-
MD5
7a534ef2cecdf25929b6dac2ea11a751
-
SHA1
10cf8c504d4389af3b05f973ea7339538acf5994
-
SHA256
7778e7c531eab90096c841dd23c00fca5fc06362787ebe6f6a0d93e2c54348ac
-
SHA512
e5f87b16dc5f463aca6fc8bf022f445bde88936e36c8e97a98b0fb131f5a9f7ad4ff812e7c7ed465777c383cec90aaa4fca5d51aa4493c97fd0377647738a4ee
-
SSDEEP
24576:t2IaWE2avgDij2+5flCSmr0JD6FDvIwz7TXThZaWSw:QIaW5G9ClamFc8TXTfaW9
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 1 IoCs
Processes:
resource yara_rule sample UPX -
Processes:
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 7778e7c531eab90096c841dd23c00fca5fc06362787ebe6f6a0d93e2c54348ac
Files
-
7778e7c531eab90096c841dd23c00fca5fc06362787ebe6f6a0d93e2c54348ac.exe windows:4 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 68KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.btnj Size: 34KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.t Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE