Static task
static1
Behavioral task
behavioral1
Sample
01e20f17600b7192d4c51d06b6a42db2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
01e20f17600b7192d4c51d06b6a42db2.exe
Resource
win10v2004-20231215-en
General
-
Target
01e20f17600b7192d4c51d06b6a42db2
-
Size
32KB
-
MD5
01e20f17600b7192d4c51d06b6a42db2
-
SHA1
4ed38a0a6a29af9d2cca802a6ea9577759ef418e
-
SHA256
3f0e71cc4f5e2f4ede602341823ca5769bccd1f6b058d3c6342b83c98547aa8f
-
SHA512
1deb1346b55bc96246580f48eb04ec0501009a5c012acf4b175f484595ad30d8a4c7abde94bb667c9ac43ca9e06bea972e05c0de5b7ac0f82786c39bdbf04ee0
-
SSDEEP
384:WRLMGu9SqNQCtFvUBoBRCMnMZ8O+7lt1vgLHTgYYbgwbznWKDeEOaRr//LGc:6sBUe/1vgbsPbgXKDHOaRHl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 01e20f17600b7192d4c51d06b6a42db2
Files
-
01e20f17600b7192d4c51d06b6a42db2.exe windows:4 windows x86 arch:x86
434a27d8b954914cb2210ab0925ba35f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
RtlMoveMemory
msvbvm60
MethCallEngine
ord516
ord598
ord631
EVENT_SINK_AddRef
DllFunctionCall
EVENT_SINK_Release
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord606
ord608
ord717
ProcCallEngine
ord644
ord100
ord616
Sections
.text Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ