Behavioral task
behavioral1
Sample
99e21d90f48663015c3778b2f07e6210N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
99e21d90f48663015c3778b2f07e6210N.exe
Resource
win10v2004-20240802-en
General
-
Target
99e21d90f48663015c3778b2f07e6210N.exe
-
Size
120KB
-
MD5
99e21d90f48663015c3778b2f07e6210
-
SHA1
00462039492c9c16a40e9ecdd78180f0f7af21d1
-
SHA256
2395d7315c0f729d243bdd4ae069bd21db26f4dc890349d88f65dc069cb7e35a
-
SHA512
5f344da46553ce70c6a8661e8a354c2e93a2c5dc2d411323733ff32951d7846c1cda5eb8e4df618313795b2d5a9950c2d514d82e4e4d1820b2658f43c989878f
-
SSDEEP
1536:CTWn1++PJHJXA/OsIZfzc3/Q8IZTL6sTWn1++PJHJXA/OsIZfzc3/Q8IZTL6rN+E:KQSo7ZnQSo7Zy
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 99e21d90f48663015c3778b2f07e6210N.exe unpack001/out.upx
Files
-
99e21d90f48663015c3778b2f07e6210N.exe.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 24KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 352B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ