Static task
static1
Behavioral task
behavioral1
Sample
Babya__Presenter.exe
Resource
win7-20231023-en
Behavioral task
behavioral2
Sample
Babya__Presenter.exe
Resource
win10v2004-20231023-en
General
-
Target
Babya__Presenter.exe
-
Size
124KB
-
MD5
0587f36f418bc1008c0a27c81bdf9f3a
-
SHA1
e7e05993dc4e473aabf214c354319908deaf9257
-
SHA256
7b36c0b7d37651a0c0db17db2aa49ef8d2b70bdaa7bc0b5a6246fce3b5e106de
-
SHA512
b53724eb4b2e6e92fca94bf3591f65403dad210726f29f2c45c498d653ae074528d5ba3aa3862c384d3590c977b7abbb2a06592449bdcf79e91a6e68b1483a24
-
SSDEEP
1536:K+ZgITRhvJMbsvZ/G5ruAkGlF9wwUpGMF8MHEeefkkU4Y0FW:ZZJnJMaUuAvWp8M3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Babya__Presenter.exe
Files
-
Babya__Presenter.exe.exe windows:4 windows x86
a3a02f486c8701fe6511925f46602eda
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
ord588
MethCallEngine
ord518
ord593
ord595
ord596
ord598
ord632
EVENT_SINK_AddRef
ord529
DllFunctionCall
EVENT_SINK_Release
ord600
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord531
ord716
ProcCallEngine
ord571
ord576
ord685
ord100
Sections
.text Size: 116KB - Virtual size: 113KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 19KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ