Behavioral task
behavioral1
Sample
450db42ec387724b3979f81561727dff5b68ef9c9cfd0a50e38197474c1e2944.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
450db42ec387724b3979f81561727dff5b68ef9c9cfd0a50e38197474c1e2944.exe
Resource
win10v2004-20240426-en
General
-
Target
450db42ec387724b3979f81561727dff5b68ef9c9cfd0a50e38197474c1e2944
-
Size
149KB
-
MD5
0e2235b576253d56dab6bb43ac954e31
-
SHA1
ac44c5b3c65a9fdbb9aaec3f653401278818d1a5
-
SHA256
450db42ec387724b3979f81561727dff5b68ef9c9cfd0a50e38197474c1e2944
-
SHA512
a57b0241a3db39024021c7ae8cf82d857aa5a0ddce95a98057aec2935a36a815a13e6db193357ac750081a529e69a174be77003dbb286f1254fc779a1b7da865
-
SSDEEP
1536:67Zf/FAxTWY1++PJHJXA/OsIZfzc3/Q8s316u0MXo7Rwcz6G7wb/G0CIvXZ9yhHe:+nyiQSobuBhe6MiIqWLsUu3ih
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 1 IoCs
Processes:
resource yara_rule sample UPX -
Processes:
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 450db42ec387724b3979f81561727dff5b68ef9c9cfd0a50e38197474c1e2944
Files
-
450db42ec387724b3979f81561727dff5b68ef9c9cfd0a50e38197474c1e2944.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: 21KB - Virtual size: 24KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.imports Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE