Behavioral task
behavioral1
Sample
f047126b6bb1f6e427fffcd9b92aab09d484dbeae6619ab85f42f82ae2c13e05.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
f047126b6bb1f6e427fffcd9b92aab09d484dbeae6619ab85f42f82ae2c13e05.exe
Resource
win10v2004-20240508-en
General
-
Target
f047126b6bb1f6e427fffcd9b92aab09d484dbeae6619ab85f42f82ae2c13e05
-
Size
487KB
-
MD5
ac9c5f83e4e4e0e2156f1542b506cec9
-
SHA1
3cf2f58ddb1992104d12806d24bf81a152d1e376
-
SHA256
f047126b6bb1f6e427fffcd9b92aab09d484dbeae6619ab85f42f82ae2c13e05
-
SHA512
9b5392920befbe80db81591241586945cd95bb1dc59ae5c8e20b9a40751703faae82e3720809e5b9fdf8f0d01b29ca103b710689a829767d20c348b09d62e739
-
SSDEEP
12288:2R/y00bzAlvpYq1orkEHck8IzDqY33k0erdxuwrL:2fMgsvqY3Crdxu
Malware Config
Signatures
-
Detects executables containing artifacts associated with disabling Widnows Defender 1 IoCs
resource yara_rule static1/unpack001/out.upx INDICATOR_SUSPICIOUS_DisableWinDefender -
Detects executables embedding registry key / value combination indicative of disabling Windows Defender features 1 IoCs
resource yara_rule static1/unpack001/out.upx INDICATOR_SUSPICIOUS_EXE_RegKeyComb_DisableWinDefender -
UPX dump on OEP (original entry point) 1 IoCs
resource yara_rule sample UPX -
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource f047126b6bb1f6e427fffcd9b92aab09d484dbeae6619ab85f42f82ae2c13e05 unpack001/out.upx
Files
-
f047126b6bb1f6e427fffcd9b92aab09d484dbeae6619ab85f42f82ae2c13e05.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
UPX0 Size: - Virtual size: 1.1MB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 474KB - Virtual size: 476KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_BYTES_REVERSED_HI
Sections
CODE Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
DATA Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
BSS Size: - Virtual size: 260KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 11KB - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.tls Size: - Virtual size: 16B
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rdata Size: 512B - Virtual size: 24B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 57KB - Virtual size: 57KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 91KB - Virtual size: 90KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ