Behavioral task
behavioral1
Sample
37277a054c002b77e90f0c72ab227ce6a0e3c79f8160b4450c05a79302cfb44b.exe
Resource
win7-20240729-en
General
-
Target
37277a054c002b77e90f0c72ab227ce6a0e3c79f8160b4450c05a79302cfb44b
-
Size
99KB
-
MD5
b9882322b130f55d29fa60ca395ee5aa
-
SHA1
d362f4d41e5e74fac270981e9ab3069d831cca4f
-
SHA256
37277a054c002b77e90f0c72ab227ce6a0e3c79f8160b4450c05a79302cfb44b
-
SHA512
9ad037cc7172aa2fba340b7056f4f52049af831d7f9f3fe8c739bc385a83b9c8d238272323478d2e393021999a66920cfcd4e9912128081abde82692c2abfe2f
-
SSDEEP
3072:AvG70IH+GevywnePTNOfxFMthB9BZBRfs:oGF1KywNgD/rS
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 37277a054c002b77e90f0c72ab227ce6a0e3c79f8160b4450c05a79302cfb44b unpack001/out.upx
Files
-
37277a054c002b77e90f0c72ab227ce6a0e3c79f8160b4450c05a79302cfb44b.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 96KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 35KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 68KB - Virtual size: 66KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 8KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 21KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ