Behavioral task
behavioral1
Sample
14927dc517ccb25d33ada09cc16217ee6eae7c2175b4eefdb11b0acadea38a20.exe
Resource
win7-20240903-en
General
-
Target
14927dc517ccb25d33ada09cc16217ee6eae7c2175b4eefdb11b0acadea38a20
-
Size
513KB
-
MD5
ba636d41eda0ce8c2b84d78cae57d214
-
SHA1
5cd3ef528e07352819101c7fb71f162f0798cf5b
-
SHA256
14927dc517ccb25d33ada09cc16217ee6eae7c2175b4eefdb11b0acadea38a20
-
SHA512
b960c1f530e8cbd7d456dbeb41d2c7ca414430e0defe727f7e155399dcc0fd53abdbe638a9aabd83b0d3be713107f8c2ee6db475bc5d423689a881a76366c6ee
-
SSDEEP
6144:kNdSUhX1Sm0Bin1kA1GbunjIV1/CRxG38UTMfKQL3EitYtspAnK:kNsUhXIm0cn1kACY8lCRw3PTqKgpqfnK
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource 14927dc517ccb25d33ada09cc16217ee6eae7c2175b4eefdb11b0acadea38a20 unpack001/out.upx
Files
-
14927dc517ccb25d33ada09cc16217ee6eae7c2175b4eefdb11b0acadea38a20.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 24KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 4KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 352B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ