Behavioral task
behavioral1
Sample
ca7c65b33b90cd90d8c1e87772b14f0afdc3af526974d3e3848c8fafc0792fc3.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
ca7c65b33b90cd90d8c1e87772b14f0afdc3af526974d3e3848c8fafc0792fc3.exe
Resource
win10v2004-20240704-en
General
-
Target
ca7c65b33b90cd90d8c1e87772b14f0afdc3af526974d3e3848c8fafc0792fc3
-
Size
63KB
-
MD5
65dc14e6a3f83b84c9af0839380c63a2
-
SHA1
15d5fe04bb687ad999e70b1bb91f49ebc07b04fd
-
SHA256
ca7c65b33b90cd90d8c1e87772b14f0afdc3af526974d3e3848c8fafc0792fc3
-
SHA512
6a20161678728d2ab7405cf3cb142488f68fe2384185aad5ecae3127ab568ceffcae5a38cea1ab9e6cd7392102e176d1cec6d8de4c2bcdf3402502d51e5c9936
-
SSDEEP
768:jSxam3Usjr3REXXr8yxFChMp7v9DLKrzCnbcuyD7UVeQI5noeVcAvcV4RP0U+t6:jRsjdEIUFC2p79OCnouy8VD3AG4RsfU
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource ca7c65b33b90cd90d8c1e87772b14f0afdc3af526974d3e3848c8fafc0792fc3
Files
-
ca7c65b33b90cd90d8c1e87772b14f0afdc3af526974d3e3848c8fafc0792fc3.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 140KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 31KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE