Behavioral task
behavioral1
Sample
f629ddb510640db1c45cb3c8e28e99366ace8445a03f313f79d06727021159bfN.exe
Resource
win7-20240903-en
General
-
Target
f629ddb510640db1c45cb3c8e28e99366ace8445a03f313f79d06727021159bfN
-
Size
264KB
-
MD5
f5c6bc5f53182c8041e2e796ed492d30
-
SHA1
c1e09dbed2cd4e351c990ffcfb2ef25dc480d876
-
SHA256
f629ddb510640db1c45cb3c8e28e99366ace8445a03f313f79d06727021159bf
-
SHA512
b7188d063d5c5e9d7cc224c62ebd394d26037c34998fd5078f1fec64a2699401062f3c831fe3da833c1135d46314c6524dd3651a2c4348afbea789777231c16d
-
SSDEEP
6144:+lUjEKIhdz4Tlw0bpWtVUrTocNBGWI/3JeY7Ko8CaZ:AUYKOWTlf7rToSBI3WohaZ
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 2 IoCs
Checks for missing Authenticode signature.
resource f629ddb510640db1c45cb3c8e28e99366ace8445a03f313f79d06727021159bfN unpack001/out.upx
Files
-
f629ddb510640db1c45cb3c8e28e99366ace8445a03f313f79d06727021159bfN.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
UPX0 Size: - Virtual size: 320KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 262KB - Virtual size: 264KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
-
out.upx.exe windows:4 windows x86 arch:x86
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Sections
.text Size: 252KB - Virtual size: 248KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: 248KB - Virtual size: 315KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 656B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ