Behavioral task
behavioral1
Sample
DeviceEmulator.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
DeviceEmulator.exe
Resource
win10v2004-20240426-en
General
-
Target
DeviceEmulator.exe
-
Size
61KB
-
MD5
124724909a7dffe1bb4da786ed44e43a
-
SHA1
f11f488ffff47708e5de29b7e6b1c3511d8af80a
-
SHA256
73f77740c9d397223875bd99fb3c86ae45a4fc7958b1a2175364555603f2e973
-
SHA512
1f00c401a08ac32ef3464ca092ffba2fa16348c02fe05fcaeabe9e486b6d586fa75b2548c6209801da0880c0e0d2dd5ac97656376635fe9d0c214b734f377f8d
-
SSDEEP
1536:MjiLoVnssc8/tWaguP/emO6dFiCQAwQG8nub:A5ssZFWagmRO6dF9wZ8nO
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource DeviceEmulator.exe
Files
-
DeviceEmulator.exe.exe windows:6 windows x64 arch:x64
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_HIGH_ENTROPY_VA
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
Sections
UPX0 Size: - Virtual size: 204KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 59KB - Virtual size: 60KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE