Behavioral task
behavioral1
Sample
42256d900c898d4ce3381dfa19ed0940N.exe
Resource
win7-20240708-en
General
-
Target
42256d900c898d4ce3381dfa19ed0940N.exe
-
Size
116KB
-
MD5
42256d900c898d4ce3381dfa19ed0940
-
SHA1
db8b4ea5657e842f6badfe1a556004a80de39709
-
SHA256
9f43eafc3deec0e8d74bb1147af996041c4982bb26e39c534235ca46cb0413dc
-
SHA512
5681508e23ce30119a50984122e336060cb27757ca8f167dcb8fa03d853968146ab885e75230bd07bcd7fca305774e48696c22cce06d31bd708dec0d61a10887
-
SSDEEP
768:eKXxN17zn66W2zONFgxNYR+nbcuyD7UjZL:eoxNVzn66gR+nouy8jZL
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 42256d900c898d4ce3381dfa19ed0940N.exe
Files
-
42256d900c898d4ce3381dfa19ed0940N.exe.exe windows:1 windows x86 arch:x86
c8d12a373d049b18069f8b82cc0c6c57
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
CloseHandle
CreateFileA
ExitProcess
WriteFile
lstrlenA
lstrcatA
GetTempFileNameA
WinExec
GetTempPathA
GetShortPathNameA
GetCurrentDirectoryA
user32
wsprintfA
Sections
UPX0 Size: 28KB - Virtual size: 28KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 12KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE