Static task
static1
Behavioral task
behavioral1
Sample
00508283ce0705a13e2e1315ef0f3abf.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
00508283ce0705a13e2e1315ef0f3abf.exe
Resource
win10v2004-20231215-en
General
-
Target
00508283ce0705a13e2e1315ef0f3abf
-
Size
20KB
-
MD5
00508283ce0705a13e2e1315ef0f3abf
-
SHA1
1262739949efd7193e2a5e0329da51e2455fb392
-
SHA256
7c5a0bc10eb73ef354337820b809bdb38048174cc9d272bebf02287c5f374b3f
-
SHA512
6d1bd85c07205f1df98c242f12ea58d7c7a987562b8b0f21cf49936c77b91089bddd2a6a7b2eacf63eb3a1e6e8a14bc347cdb7bb33d0a6db0cb6f303082db90f
-
SSDEEP
96:m+UQNJBsuKOcr9DP1FO/dbLcfmWSfxpalj/3:vJGDP1FyJc8fvo3
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 00508283ce0705a13e2e1315ef0f3abf
Files
-
00508283ce0705a13e2e1315ef0f3abf.exe windows:4 windows x86 arch:x86
053b801894032d0fe06acceaac0140dd
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
__vbaVarSub
_CIcos
_adj_fptan
__vbaFreeVar
__vbaStrVarMove
__vbaFreeVarList
_adj_fdiv_m64
_adj_fprem1
__vbaStrCat
__vbaSetSystemError
_adj_fdiv_m32
__vbaAryDestruct
__vbaFileCloseAll
_adj_fdiv_m16i
_adj_fdivr_m16i
_CIsin
__vbaChkstk
ord526
__vbaFileClose
__vbaStrCmp
__vbaGet4
__vbaPutOwner3
DllFunctionCall
ord670
_adj_fpatan
__vbaRedim
ord600
_CIsqrt
__vbaExceptHandler
__vbaStrToUnicode
_adj_fprem
_adj_fdivr_m64
ord608
__vbaFPException
__vbaInStrVar
__vbaVarCat
__vbaGetOwner4
ord645
_CIlog
__vbaErrorOverflow
__vbaFileOpen
ord570
_adj_fdiv_m32i
_adj_fdivr_m32i
__vbaStrCopy
__vbaFreeStrList
_adj_fdivr_m32
_adj_fdiv_r
ord100
__vbaI4Var
__vbaStrToAnsi
ord617
_CIatan
__vbaStrMove
_allmul
_CItan
_CIexp
__vbaFreeStr
ord580
Sections
.text Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 752B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 924B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ