Behavioral task
behavioral1
Sample
12392ca844ea3ed32cfdf8371cad3f47.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
12392ca844ea3ed32cfdf8371cad3f47.exe
Resource
win10v2004-20231215-en
General
-
Target
12392ca844ea3ed32cfdf8371cad3f47
-
Size
47KB
-
MD5
12392ca844ea3ed32cfdf8371cad3f47
-
SHA1
59404fedc6f0348432227c67026dd087d4c6e704
-
SHA256
70c19e7f064e9c05d934b9592c453f52603cd903f0738de7df43d5b99d8b5047
-
SHA512
50fa6ea9ac72005c81d8342cf68f9862b4fc398ae4c0a0fa29d917e2380c5a7c3f0ee6be24f45eb5de3bf8949e760d4601a77fbdb5f31f2b0a5fcd380db14a72
-
SSDEEP
384:flr9NYb8Oq/T45/H5HmXrcsXQuWC42Cb56aDkJBgjQS:B87qb45/F2rcsXQun42C5bIJq7
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 12392ca844ea3ed32cfdf8371cad3f47
Files
-
12392ca844ea3ed32cfdf8371cad3f47.exe windows:4 windows x86 arch:x86
aa614d5244fd8e237b788be8b9116d3e
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm50
MethCallEngine
EVENT_SINK_AddRef
DllFunctionCall
EVENT_SINK_Release
EVENT_SINK_QueryInterface
__vbaExceptHandler
ProcCallEngine
Sections
UPX0 Size: 44KB - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 2KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.avp Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE