Behavioral task
behavioral1
Sample
0cf6e06e09ff1c7990da1dcfacf8d2ec1d0e6f92dbc284165d24d58e6f61f6b4.exe
Resource
win7-20240508-en
General
-
Target
0cf6e06e09ff1c7990da1dcfacf8d2ec1d0e6f92dbc284165d24d58e6f61f6b4
-
Size
58KB
-
MD5
10a9a6f41cc3b5e70acb6ca9a5ca4561
-
SHA1
ab0959f879972a4a75889c8e3912a1a73613a13a
-
SHA256
0cf6e06e09ff1c7990da1dcfacf8d2ec1d0e6f92dbc284165d24d58e6f61f6b4
-
SHA512
fb313cd0d8153b10355bb128c043c2867cd27866ea372d0e23f77559e58aafa3e390e728e47718cf6424cf59fcf47c1b642b56adab9abac5b3278845722f5c2c
-
SSDEEP
1536:kvQBeOGtrYS3srx93UBWfwC6Ggnouy8p5yAXNG1mjtREVR:khOmTsF93UYfwC6GIoutpY918cn
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 1 IoCs
Processes:
resource yara_rule sample UPX -
Processes:
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 0cf6e06e09ff1c7990da1dcfacf8d2ec1d0e6f92dbc284165d24d58e6f61f6b4
Files
-
0cf6e06e09ff1c7990da1dcfacf8d2ec1d0e6f92dbc284165d24d58e6f61f6b4.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 104KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
tkjdelw Size: 40KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE