Behavioral task
behavioral1
Sample
2d1143e3068233313100f38dc477a83c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
2d1143e3068233313100f38dc477a83c.exe
Resource
win10v2004-20231215-en
General
-
Target
2d1143e3068233313100f38dc477a83c
-
Size
85KB
-
MD5
2d1143e3068233313100f38dc477a83c
-
SHA1
a2a7d19b94c85fd85bb08f09522690bf299c5f53
-
SHA256
10c1c42d5faa29ca6799846d5cf841649052b2920b0ed46ec17036d05c148add
-
SHA512
027ce255dac9d46ee60864f7cebf747253cd20a4db1629db1e7447b5c8b350d3807ec3f8697ac7d4501d51622510ff6f5d9189092d2e5e530af78d6e5169c66a
-
SSDEEP
1536:/DDqllAM9AQR9VdF/tltC4SHWhOWgs+aDl:/2aMfLVd/ltC4SHWhLp
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 2d1143e3068233313100f38dc477a83c
Files
-
2d1143e3068233313100f38dc477a83c.exe .vbs windows:4 windows x86 arch:x86 polyglot
0ff5a4a2b1472fbd93189bf23d3f1516
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
MethCallEngine
EVENT_SINK_AddRef
EVENT_SINK_Release
EVENT_SINK_QueryInterface
__vbaExceptHandler
Sections
UPX0 Size: 80KB - Virtual size: 80KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.avp Size: 512B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE