Behavioral task
behavioral1
Sample
4712-2-0x0000000000400000-0x0000000000408000-memory.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
4712-2-0x0000000000400000-0x0000000000408000-memory.exe
Resource
win10v2004-20240802-en
General
-
Target
4712-2-0x0000000000400000-0x0000000000408000-memory.dmp
-
Size
32KB
-
MD5
a217ab58b2f9a1a0916aa9445c6a9b0a
-
SHA1
7b471363a605529614d79a5ef46831d1531bc490
-
SHA256
21e12f27e2e5224bce618766b9966b98b8369ed803b2fdf0b178ef56ae10f052
-
SHA512
81ca3b0d00f42f220fc339c8fa2189746ecd146281827d9260f31846e8ea4454f6deaa1c3645f55a84017a9a1ffac3ca8c5fb3e1c695cbada25bc3d21c41eb13
-
SSDEEP
384:rpznCFQLh6wnj6w8W06wg6uhQK0hznCFQL3P:rlCFQl6MGwT0vgFhECFQ
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 4712-2-0x0000000000400000-0x0000000000408000-memory.dmp unpack001/out.upx
Files
-
4712-2-0x0000000000400000-0x0000000000408000-memory.dmp.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 20KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
UPX1 Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 2KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 428B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ