Static task
static1
Behavioral task
behavioral1
Sample
b7f4ded0d6b6a3e94e45d47a25985242d6545e6801089e53090c0ae53f738ef3.exe
Resource
win7-20230824-en
Behavioral task
behavioral2
Sample
b7f4ded0d6b6a3e94e45d47a25985242d6545e6801089e53090c0ae53f738ef3.exe
Resource
win10v2004-20230703-en
General
-
Target
b7f4ded0d6b6a3e94e45d47a25985242d6545e6801089e53090c0ae53f738ef3
-
Size
1.0MB
-
MD5
7c16ba4fc6752f3679a3504eea4ab4e3
-
SHA1
0a9ace2ac95546605bb80a6869972cbd02effc24
-
SHA256
b7f4ded0d6b6a3e94e45d47a25985242d6545e6801089e53090c0ae53f738ef3
-
SHA512
1558a9a17a7c51a431fa72f2118d76e8e98d47961ff73c96cfab81523f632222e12bf12f4716fc7d56a792525aabc4930c35c6c135f8b82c665daa67597bc363
-
SSDEEP
24576:AgRM+2aGteCtKKwR3/9tGgRM+2aGteCtKKwR3/9tWgRM+2aGteCtKKwR3/9tkgR/:xVTV7VBVBVR
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b7f4ded0d6b6a3e94e45d47a25985242d6545e6801089e53090c0ae53f738ef3
Files
-
b7f4ded0d6b6a3e94e45d47a25985242d6545e6801089e53090c0ae53f738ef3.exe windows x86
ef27eac25b296505a566e6670aedbebf
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
ord588
ord696
ord698
MethCallEngine
ord516
ord518
ord660
ord553
ord661
ord662
ord591
ord592
ord595
ord598
ord520
ord631
ord525
ord632
ord526
ord633
EVENT_SINK_AddRef
ord529
ord637
ord561
DllFunctionCall
ord563
EVENT_SINK_Release
ord600
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord711
ord712
ord606
ord607
ord714
ord608
ord716
ord717
ord641
ProcCallEngine
ord537
ord644
ord645
ord538
ord539
ord648
ord572
ord573
ord681
ord578
ord685
ord100
ord612
ord616
ord617
ord618
ord541
ord619
ord542
ord543
ord650
ord544
ord545
ord546
ord653
ord547
ord581
Sections
.text Size: 852KB - Virtual size: 848KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 18KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 196KB - Virtual size: 193KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ