Behavioral task
behavioral1
Sample
2fcd343de0c5eaab7468e7fdd80a9a478e1cee3e60af7c0e41148e46b09ae103.exe
Resource
win7-20240704-en
General
-
Target
2fcd343de0c5eaab7468e7fdd80a9a478e1cee3e60af7c0e41148e46b09ae103
-
Size
32KB
-
MD5
c2c836fbaec5ca6933b096a5664194fc
-
SHA1
f0d8526a9cf3152b7c9ec24b817687aa792bc01b
-
SHA256
2fcd343de0c5eaab7468e7fdd80a9a478e1cee3e60af7c0e41148e46b09ae103
-
SHA512
8a924ac9a8eee4724db27e15922f82010673029dfed028564c3f081946052529207072a24df9b70d9080b5ca09f581417fe65aa58dd9fec980d4a23b6e8020ce
-
SSDEEP
768:k6z753RmVWB1pJU/WfS0VRMLBbNox4W5KeBpF:k6z7bRPS0VRML5WrP
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 2fcd343de0c5eaab7468e7fdd80a9a478e1cee3e60af7c0e41148e46b09ae103 unpack001/out.upx
Files
-
2fcd343de0c5eaab7468e7fdd80a9a478e1cee3e60af7c0e41148e46b09ae103.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 112KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 26KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 61KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 3KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE