Behavioral task
behavioral1
Sample
d5fa997f1e838ee8377124a54220c540N.exe
Resource
win7-20240903-en
General
-
Target
d5fa997f1e838ee8377124a54220c540N
-
Size
7KB
-
MD5
d5fa997f1e838ee8377124a54220c540
-
SHA1
3b41493a4cbb9fccaec6ac037bd16029ced1f94d
-
SHA256
4a22d5aa986b3d5d7225775243975ee4242ab01422f72fb0bf1151cd9d90408d
-
SHA512
9b6cd6dd642a76a2f6f1ca9a2ea3366192ce5970fb4b3e42d11d4d69befcd2275951f3b26f4464b00b318d0ccf34c5066b4fa83af63d62faa0f009376aa02937
-
SSDEEP
192:wL1NBZ9GnMjF66ln4+LyFVICq6E3+x8thz/hmq0/:w7Trl4+LwxESuhzJmj/
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d5fa997f1e838ee8377124a54220c540N
Files
-
d5fa997f1e838ee8377124a54220c540N.exe windows:4 windows x86 arch:x86
2e44cfc71d5ba99dd6dedb0e2f43d741
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_NO_SEH
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
EnterCriticalSection
FindResourceExA
user32
GetDlgItemInt
Sections
UPX0 Size: - Virtual size: 20KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX2 Size: 2KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE