Behavioral task
behavioral1
Sample
3bc92621bc18d21922a7250a148988deb752522da9967e02e3e258b3546d419f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
3bc92621bc18d21922a7250a148988deb752522da9967e02e3e258b3546d419f.exe
Resource
win10v2004-20240419-en
General
-
Target
3bc92621bc18d21922a7250a148988deb752522da9967e02e3e258b3546d419f
-
Size
5.6MB
-
MD5
1edb974b3a3298a05902d139c0306843
-
SHA1
8d8746b3a748263d2771090d11985b7669457656
-
SHA256
3bc92621bc18d21922a7250a148988deb752522da9967e02e3e258b3546d419f
-
SHA512
afbfb6041322a664649725d01fd7420e32b3e0a44b0414f45d8aba8e2de28b43148f43dbdb08311717b621934ab29bccacda003af26cb7efcbb81764838c8f44
-
SSDEEP
98304:Ofa1VatTEpXcMZCOvTMru/KYbGQY+u1K+V/IAHhfza5aGZTa1dxR+wQ7pzCfPys7:KmwTxKTv/KKYV1lIAH1zaR9gxfQR+yQ
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 3bc92621bc18d21922a7250a148988deb752522da9967e02e3e258b3546d419f
Files
-
3bc92621bc18d21922a7250a148988deb752522da9967e02e3e258b3546d419f.exe windows:5 windows x86 arch:x86
d5780fa83dc2435eacf8918f52494e6b
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
lstrcpy
user32
MessageBoxExA
Sections
UPX0 Size: 2.3MB - Virtual size: 6.5MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 481KB - Virtual size: 792KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
Size: 512B - Virtual size: 4.2MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
ukegzepj Size: 2.8MB - Virtual size: 2.8MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE