Static task
static1
Behavioral task
behavioral1
Sample
20eec1274b7f521d91d6b50a9974a02e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
20eec1274b7f521d91d6b50a9974a02e.exe
Resource
win10v2004-20231222-en
General
-
Target
20eec1274b7f521d91d6b50a9974a02e
-
Size
236KB
-
MD5
20eec1274b7f521d91d6b50a9974a02e
-
SHA1
478d173a338af5c396ee98d4d7ee7dfed1c832cc
-
SHA256
45bf606ff28556d7f2f448f47bb91fef6beff271ef386eceee53204eeddd2c0e
-
SHA512
c7941c48e26452cf2037dec250039a87817b7976a3208817bd9d33465ebcefdb5fba812e22c8a279e8fd8d87c7e9e74f0a19e5994a70f5a3aa585864f3d48d25
-
SSDEEP
3072:oqfNOOlunaFFaTJQ+u8ysBsa/AC7zErvrZMf:oqFOOluJJQ+u8yivO
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 20eec1274b7f521d91d6b50a9974a02e
Files
-
20eec1274b7f521d91d6b50a9974a02e.exe windows:4 windows x86 arch:x86
1faaa7e82567fe09223721e262a0956b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
EVENT_SINK_GetIDsOfNames
ord582
ord583
ord584
ord585
ord187
ord588
ord698
MethCallEngine
EVENT_SINK_Invoke
ord621
ord516
ord517
ord518
ord519
Zombie_GetTypeInfo
ord595
ord598
ord520
ord306
ord307
ord630
ord631
ord709
ord525
ord632
EVENT_SINK_AddRef
ord527
ord528
ord529
ord561
ord562
DllFunctionCall
ord670
ord567
Zombie_GetTypeInfoCount
EVENT_SINK_Release
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord711
ord712
ord606
ord713
ord714
ord607
ord608
ord318
ord717
ord319
ProcCallEngine
ord535
ord537
ord644
ord645
ord570
ord648
ord571
ord681
ord578
ord100
ord579
ord320
ord321
ord614
ord616
ord617
ord618
ord619
ord542
ord650
ord544
Sections
.text Size: 212KB - Virtual size: 211KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ