Behavioral task
behavioral1
Sample
c2346ce0e72ce853fc5021aa9d40235bed69f860558be65a4f4757077c1d740b.exe
Resource
win7-20240708-en
General
-
Target
c2346ce0e72ce853fc5021aa9d40235bed69f860558be65a4f4757077c1d740b
-
Size
53KB
-
MD5
c417672dfb787829ab87280162385795
-
SHA1
d6c45b0f3d5441f0f6656c05ec658bda7cf43378
-
SHA256
c2346ce0e72ce853fc5021aa9d40235bed69f860558be65a4f4757077c1d740b
-
SHA512
83ac47feaf644fcc8e0435caf2693203b92f1fc3fb0669ec57103b0659d69a4e900dc194c42e724daba0dc48a560256e0fb9798deb5eac6f08952a02be8987ec
-
SSDEEP
1536:CTWn1++PJHJXA/OsIZfzc3/Q8zxDZj1hcaEWAIy+2:KQSomZj1hcaEWAIy+2
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource c2346ce0e72ce853fc5021aa9d40235bed69f860558be65a4f4757077c1d740b unpack001/out.upx
Files
-
c2346ce0e72ce853fc5021aa9d40235bed69f860558be65a4f4757077c1d740b.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 24KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 352B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ