Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230220-en
General
-
Target
tmp
-
Size
649KB
-
MD5
84b1cbc52fa9a20124dda922f7fc24b7
-
SHA1
63861052970ad9487c218406f1478190c6c9e51b
-
SHA256
c80849b89470656a8f81e539e38a7246e032d943639e3a161612a6daabb77282
-
SHA512
edfb68c6ad97421449f97669afa2db5ccc63ec4a70a778ccec25b8ff08eaa36cc7ed1e3dc8ccb394efff42fa46a6e25d045249c1f2e1edbbd119840c4c45330f
-
SSDEEP
12288:c2a4jE4j44jJtUMTSshgft6gXN2bPnYj4dD2RIyeA/m2HaYOJaP:nRfLrYshKUe8fYj4tEmA/m2HaYAaP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource tmp
Files
-
tmp.exe windows x86
084e3cbd11b9de5a5addaa5b312aaf94
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
EVENT_SINK_GetIDsOfNames
MethCallEngine
EVENT_SINK_Invoke
ord516
ord517
ord519
ord666
Zombie_GetTypeInfo
ord593
ord594
ord595
ord598
ord521
ord709
ord631
ord525
EVENT_SINK_AddRef
DllFunctionCall
Zombie_GetTypeInfoCount
EVENT_SINK_Release
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord711
ord606
ord607
ord608
ord717
ord319
ProcCallEngine
ord644
ord537
ord645
ord572
ord681
ord578
ord100
ord320
ord321
ord616
ord618
ord650
ord546
Sections
.text Size: 144KB - Virtual size: 141KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ