Static task
static1
Behavioral task
behavioral1
Sample
3dc0c16c6d9fc840b9c5c398c715a5c4e058127be9a4fa9e2366b71fc90a5fe7.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
3dc0c16c6d9fc840b9c5c398c715a5c4e058127be9a4fa9e2366b71fc90a5fe7.exe
Resource
win10v2004-20230703-en
General
-
Target
d1abdc3faa14122cd460be0f55e7941f.bin
-
Size
32KB
-
MD5
84ba3294847e00dda07996de8a1d9d84
-
SHA1
cfa6ff53c8fab66c68e25e9e89f55e1e68e14321
-
SHA256
dad65652393dfc3807752d02f84a8cf9744fdb51f4110148d46bceefcdb4f31c
-
SHA512
2240fccd062b3bd1e0464e70577dcec8c69b729299ac076f5e012857bf5986ac8551e2c05895537e0d4bcc31da7e9b81b394aa50cc34ed8db2cd7fc624c087e3
-
SSDEEP
768:UwXSsWIvVG+gwhZ4q/VN3vXERO00vdLfhdGD7tKDZF9iSO387tuS:UfsWQ7gwhz//URjkdZAEDk38Z
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/3dc0c16c6d9fc840b9c5c398c715a5c4e058127be9a4fa9e2366b71fc90a5fe7.exe
Files
-
d1abdc3faa14122cd460be0f55e7941f.bin.zip
Password: infected
-
3dc0c16c6d9fc840b9c5c398c715a5c4e058127be9a4fa9e2366b71fc90a5fe7.exe.exe windows x86
Password: infected
d2a929dcfe69974be4acf3d51dc42776
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
__vbaVarTstGt
__vbaVarSub
__vbaStrI2
_CIcos
_adj_fptan
__vbaFreeVar
__vbaStrVarMove
__vbaEnd
__vbaFreeVarList
_adj_fdiv_m64
__vbaFreeObjList
_adj_fprem1
__vbaSetSystemError
__vbaHresultCheckObj
_adj_fdiv_m32
ord300
ord595
__vbaOnError
__vbaObjSet
_adj_fdiv_m16i
_adj_fdivr_m16i
ord306
__vbaBoolVarNull
_CIsin
__vbaVarCmpGt
__vbaChkstk
EVENT_SINK_AddRef
__vbaI2I4
DllFunctionCall
__vbaVarOr
_adj_fpatan
EVENT_SINK_Release
_CIsqrt
__vbaVarAnd
EVENT_SINK_QueryInterface
__vbaExceptHandler
__vbaStrToUnicode
_adj_fprem
_adj_fdivr_m64
__vbaI2Str
__vbaFPException
ord717
__vbaStrVarVal
ord534
_CIlog
__vbaErrorOverflow
__vbaNew2
_adj_fdiv_m32i
_adj_fdivr_m32i
__vbaStrCopy
__vbaFreeStrList
__vbaVarCmpLt
_adj_fdivr_m32
_adj_fdiv_r
ord100
__vbaVarCmpEq
__vbaVarAdd
__vbaVarDup
__vbaStrToAnsi
__vbaFpI2
_CIatan
__vbaStrMove
ord543
_allmul
ord544
_CItan
ord546
_CIexp
__vbaFreeObj
__vbaFreeStr
ord581
Sections
.text Size: 32KB - Virtual size: 30KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 524KB - Virtual size: 520KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ