Behavioral task
behavioral1
Sample
97cb8f1b720cc59f7c1bb9fecb33b832d76014f7048e7aa5cd22056673eb84f3.exe
Resource
win7-20240704-en
General
-
Target
97cb8f1b720cc59f7c1bb9fecb33b832d76014f7048e7aa5cd22056673eb84f3
-
Size
101KB
-
MD5
f90dc893f06fe983cf8a31fe4f324902
-
SHA1
02a6aac9083be148579845b3cc64565860a09866
-
SHA256
97cb8f1b720cc59f7c1bb9fecb33b832d76014f7048e7aa5cd22056673eb84f3
-
SHA512
6729383a7b6e7a0c4e8a8760a34c4271b63914bb928cb2db0732340362e582b8b7349f44e3e6973b710579dda2276038f39f751f0fdbd645e531c9e4f131e030
-
SSDEEP
1536:CTW7JJ7THJwtJwhTmXadjUSbcDemTPAZk+cLtdNlb9PfESDOayxaJP:hn6W2QZwKS7J
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 97cb8f1b720cc59f7c1bb9fecb33b832d76014f7048e7aa5cd22056673eb84f3 unpack001/out.upx
Files
-
97cb8f1b720cc59f7c1bb9fecb33b832d76014f7048e7aa5cd22056673eb84f3.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 24KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 352B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ