Behavioral task
behavioral1
Sample
ff133df9890339f9cd11a81e5b6ce445b25b64e59db5ce495ecea6ca4df1a855.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
ff133df9890339f9cd11a81e5b6ce445b25b64e59db5ce495ecea6ca4df1a855.exe
Resource
win10v2004-20240419-en
General
-
Target
ff133df9890339f9cd11a81e5b6ce445b25b64e59db5ce495ecea6ca4df1a855
-
Size
1.0MB
-
MD5
3323831b7ac97859032d4768de577f06
-
SHA1
f25a8cbdc4b978ba7b49d536dbce43c98f47e5e5
-
SHA256
ff133df9890339f9cd11a81e5b6ce445b25b64e59db5ce495ecea6ca4df1a855
-
SHA512
1e8ca61579af29035af62ea0c81bd868d8af485579833b19184c7ee6b9905b380efbdaeacf41a112a60ec527706ed59145b754604885be84f07cc82a8f28b4cc
-
SSDEEP
24576:Au6J33O0c+JY5UZ+XC0kGsoThLQtqY2Kj0/WYs:qu0c++OCvkGsEhL4q1m0OYs
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 1 IoCs
resource yara_rule sample UPX -
resource yara_rule sample upx -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule sample autoit_exe -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ff133df9890339f9cd11a81e5b6ce445b25b64e59db5ce495ecea6ca4df1a855
Files
-
ff133df9890339f9cd11a81e5b6ce445b25b64e59db5ce495ecea6ca4df1a855.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: 588KB - Virtual size: 588KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 341KB - Virtual size: 344KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 81KB - Virtual size: 84KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.imports Size: 9KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 28KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE