Static task
static1
Behavioral task
behavioral1
Sample
193460b43722438a162df4b740d8ccd4.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
193460b43722438a162df4b740d8ccd4.exe
Resource
win10v2004-20231215-en
General
-
Target
193460b43722438a162df4b740d8ccd4
-
Size
692KB
-
MD5
193460b43722438a162df4b740d8ccd4
-
SHA1
adde849ff2ebd5ab85bdb4075b6ba812fc1f01e7
-
SHA256
87e02f29fe50e052f7fb2f65f7795484eb7ae6c41859c755fc5f86e81de6f020
-
SHA512
35443ba627bfb07f36b2b9e4d4fedb27de861666ba21781237d66313d06825f542fe5992cc03e7f5eb82b4df858169c273377ca8df37a320e61a80f4da6a93dd
-
SSDEEP
12288:P/uAGTo28+SCyqzQSTorJoBrcN6kNupgt2JxloBgl:P/uAa8vcDcrKBrUxcdJxlo2
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 193460b43722438a162df4b740d8ccd4
Files
-
193460b43722438a162df4b740d8ccd4.exe windows:4 windows x86 arch:x86
0db0712468b7455091636194fd8e89bc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
winmm
mciSendStringA
user32
LoadIconW
msvbvm60
ord696
ord697
MethCallEngine
ord516
ord517
ord519
ord666
ord667
ord593
ord594
ord595
ord709
ord631
ord525
ord526
EVENT_SINK_AddRef
ord529
DllFunctionCall
EVENT_SINK_Release
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord712
ord606
ord531
ord716
ord717
ord534
ProcCallEngine
ord644
ord537
ord572
ord576
ord685
ord100
ord616
ord617
ord618
ord580
Sections
.text Size: 108KB - Virtual size: 107KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc.. Size: 580KB - Virtual size: 577KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE