Behavioral task
behavioral1
Sample
random exploit [cracked] .exe
Resource
win11-20240426-en
General
-
Target
random exploit [cracked] .exe
-
Size
46KB
-
MD5
fd4f30199a29e2a68bbee4c88903381a
-
SHA1
f2a3da7c1d5e94e8bebaf6607c415a02d3599e37
-
SHA256
7821908bd4d83f2d6b9e23d5cf242655811dc55f5a8d02f0469f5cd42e345d1a
-
SHA512
487cccca2332fe00f313813e7e113991f56bbaba76c1fd782b78d107651eb7dcc34ed338cee2b4d9210fa2e26d4debb8c201a8b7d1c3ed4ea5a667265c5a81b1
-
SSDEEP
768:7TEibbXpEFOFqHn6LIfncGvAQi1LuvP2QNANPaWBRskFqhTLM+1mjQ567yGVde/5:3EiBwAw/cGYQi1y2QNAx1FcLD12Qs7yn
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource random exploit [cracked] .exe
Files
-
random exploit [cracked] .exe.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 64KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 43KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE