Behavioral task
behavioral1
Sample
cf92160994a8a1e92b090c696019e000N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
cf92160994a8a1e92b090c696019e000N.exe
Resource
win10v2004-20240802-en
General
-
Target
cf92160994a8a1e92b090c696019e000N.exe
-
Size
42KB
-
MD5
cf92160994a8a1e92b090c696019e000
-
SHA1
6c6edb27bb002be7636406e8c68da6f0e509a21f
-
SHA256
4364ad97b7714cf62ddbc26b8c6a07b78b30d44f1ab1d9b4dbbe4d2682e4f5f0
-
SHA512
c94c7eb69d18dbc67efa9a270d3d24cbefd38ce8e1370e2dfc9ad6833b2a9d79fb86458167c446579fc605b0b3a60db38b4ae4335ed4b77957b3f557022f4b60
-
SSDEEP
768:kBT37CPKKdJJcbQbf1Oti1JGBQOOiQJhATNydWK9WKvhWSwSuV8:CTW7JJZENTNyoKIKMSwS5
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource cf92160994a8a1e92b090c696019e000N.exe unpack001/out.upx
Files
-
cf92160994a8a1e92b090c696019e000N.exe.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 24KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 352B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ