Behavioral task
behavioral1
Sample
7aa9ce198bd1be77cd192fca4b2b5ebce9be0dff9234a56d919f4d74827ee192.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
7aa9ce198bd1be77cd192fca4b2b5ebce9be0dff9234a56d919f4d74827ee192.exe
Resource
win10v2004-20240802-en
General
-
Target
e3ff809f75c01d58c3606fe416989192.zip
-
Size
40KB
-
MD5
140ea25744f6f106a12065ec5baa24e1
-
SHA1
eefda8548a47adc0e1f17fe864899393ae441d80
-
SHA256
99223ae39569f464ea29b553602a7d12066d11f8abd80c2f7026810b963fc3d9
-
SHA512
76c16acd4b211949e4bd0f3c069c8bd056b14a5a3169c4141292350db3ca4efd3dee2743aabeaa660171b647df7d0552729f570ffd8ab15e6bf53bccf23a0dd3
-
SSDEEP
768:KDn3TJ6e68p9vQFP/Gxe67Eh8q+cWIND93N7gJBhkjgOPtelYFvxJNeJ+pLKPmtp:KLcs9YPOnEzb99UHh4gOPtqAxJNe8HJt
Malware Config
Signatures
-
resource yara_rule static1/unpack001/7aa9ce198bd1be77cd192fca4b2b5ebce9be0dff9234a56d919f4d74827ee192 upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/7aa9ce198bd1be77cd192fca4b2b5ebce9be0dff9234a56d919f4d74827ee192
Files
-
e3ff809f75c01d58c3606fe416989192.zip.zip
Password: infected
-
7aa9ce198bd1be77cd192fca4b2b5ebce9be0dff9234a56d919f4d74827ee192.exe windows:5 windows x86 arch:x86
Password: infected
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Sections
UPX0 Size: 51KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 24KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.imports Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.reloc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE