Behavioral task
behavioral1
Sample
8e40c7956af082c469274694cd394f49d3d1a66f928ee4eba30ca1b5d5496e25.exe
Resource
win7-20240704-en
General
-
Target
8e40c7956af082c469274694cd394f49d3d1a66f928ee4eba30ca1b5d5496e25
-
Size
129KB
-
MD5
8bf96564f1eb2df3b67d8a66baccbcaa
-
SHA1
5ed6428b88eaf53637fd78ddbac13e0930de5070
-
SHA256
8e40c7956af082c469274694cd394f49d3d1a66f928ee4eba30ca1b5d5496e25
-
SHA512
23402bd6d44afa0247e550253d08f302bc26b3543f126a9719c561e48917072b614ec6067bced57d53eb4be4a18990e2069a7d9c7066ac0a894e25362b26a92e
-
SSDEEP
1536:CTW7JJ7T3ja0tbmmjFFjFPjkja0tbmmjFFjFPj9844pWHlPEXZzjUq3th5f6utMa:hO8zWHIjN3tj6qnv0b2UrXkbvLZ
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 8e40c7956af082c469274694cd394f49d3d1a66f928ee4eba30ca1b5d5496e25 unpack001/out.upx
Files
-
8e40c7956af082c469274694cd394f49d3d1a66f928ee4eba30ca1b5d5496e25.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 24KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 352B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ