Static task
static1
Behavioral task
behavioral1
Sample
9088753944b585c16b60e98fb23dc0b411b4bfead9c0a42920f286b2546f08c4.exe
Resource
win7-20230824-en
Behavioral task
behavioral2
Sample
9088753944b585c16b60e98fb23dc0b411b4bfead9c0a42920f286b2546f08c4.exe
Resource
win10v2004-20230703-en
General
-
Target
e4a3d94fb93c536cd1c25c5d39a9ab18.bin
-
Size
61KB
-
MD5
c991231ed8f73d4249cec581fd4bed00
-
SHA1
469618aeee44062e4b66f83c53fac8c3f5d9ee32
-
SHA256
9c87e54922855876f5598af769e8d292cb185a901651ac84e0216e049ca2f625
-
SHA512
ff6c2ceaece32920e9cda7681e909ee73e9f22f4361f33d1a164d57c872c3843d0f56dca2779fe163ec4330b037dba027e15c4db89aa6f6cad0d0227a47a68e5
-
SSDEEP
1536:A9SfBQF2nCiq8LEZ1Fc5xRLKuCIL+lznB91M1iFcY:AcBfCi9L27KLsB9eY
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource unpack001/9088753944b585c16b60e98fb23dc0b411b4bfead9c0a42920f286b2546f08c4.exe
Files
-
e4a3d94fb93c536cd1c25c5d39a9ab18.bin.zip
Password: infected
-
9088753944b585c16b60e98fb23dc0b411b4bfead9c0a42920f286b2546f08c4.exe.exe windows x86
Password: infected
f97ae6d5d168743c22d4d45cb85be778
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
__vbaStrI2
_CIcos
_adj_fptan
__vbaVarMove
__vbaStrI4
__vbaVarVargNofree
__vbaFreeVar
__vbaStrVarMove
__vbaLenBstr
__vbaFreeVarList
__vbaEnd
_adj_fdiv_m64
__vbaNextEachVar
__vbaFreeObjList
_adj_fprem1
ord626
__vbaStrCat
ord552
__vbaLsetFixstr
ord553
ord660
__vbaSetSystemError
ord662
__vbaHresultCheckObj
ord557
_adj_fdiv_m32
__vbaVarTstLe
__vbaExitProc
__vbaForEachCollObj
__vbaObjSet
ord595
__vbaOnError
_adj_fdiv_m16i
__vbaObjSetAddref
_adj_fdivr_m16i
ord598
ord520
__vbaVarTstLt
_CIsin
ord632
__vbaNextEachCollObj
__vbaChkstk
EVENT_SINK_AddRef
__vbaStrCmp
__vbaVarTstEq
__vbaDateR8
__vbaR4Str
__vbaI2I4
__vbaObjVar
DllFunctionCall
__vbaStrR4
_adj_fpatan
__vbaFixstrConstruct
__vbaLateIdCallLd
__vbaStrR8
EVENT_SINK_Release
__vbaNew
_CIsqrt
EVENT_SINK_QueryInterface
__vbaExceptHandler
__vbaStrToUnicode
ord712
_adj_fprem
_adj_fdivr_m64
ord608
ord716
__vbaFPException
__vbaStrVarVal
__vbaVarCat
__vbaDateVar
__vbaI2Var
ord538
_CIlog
__vbaErrorOverflow
__vbaInStr
__vbaNew2
__vbaR8Str
_adj_fdiv_m32i
_adj_fdivr_m32i
__vbaStrCopy
__vbaFreeStrList
_adj_fdivr_m32
_adj_fdiv_r
ord100
__vbaVarTstNe
__vbaVarSetVar
ord610
__vbaLateMemCall
__vbaStrToAnsi
__vbaVarDup
__vbaFpI2
__vbaVarMod
__vbaVarLateMemCallLd
__vbaVarTstGe
__vbaVarCopy
__vbaVarSetObjAddref
__vbaLateMemCallLd
_CIatan
__vbaCastObj
__vbaStrMove
__vbaForEachVar
ord619
_allmul
ord545
_CItan
ord546
__vbaAryUnlock
_CIexp
__vbaFreeObj
__vbaFreeStr
ord581
Sections
.text Size: 112KB - Virtual size: 110KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ