Behavioral task
behavioral1
Sample
2252-0-0x0000000000B40000-0x0000000000BBC000-memory.exe
Resource
win7-20240903-en
General
-
Target
2252-0-0x0000000000B40000-0x0000000000BBC000-memory.dmp
-
Size
496KB
-
MD5
5f7c01b0ccaa6d4354347aa631843a71
-
SHA1
906e23fa32300f016d172b2adb4341e5d3d5aa6a
-
SHA256
e89eef999aefad1db8c29def06cf40774033c137604d8bd87713a8c6275a8c93
-
SHA512
61fa1e5bddcc7e38298a81e13ae70c5d3e772840370766bdc7721c25cc50c5b2b2c9861dcc1dc1e09b42f87397f3af251b41b0627cd58c2efb691771f5a96eff
-
SSDEEP
1536:iVhbDR/9vlGSS75olpFZkC5IwIKVKtWFunouy8P1DacIotuPjkD6xSht:819Ny75olpfLcKV2Hout9OcIosPoDzt
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2252-0-0x0000000000B40000-0x0000000000BBC000-memory.dmp
Files
-
2252-0-0x0000000000B40000-0x0000000000BBC000-memory.dmp.exe windows:5 windows x86 arch:x86
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 268KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 50KB - Virtual size: 52KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 169KB - Virtual size: 172KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE