Static task
static1
Behavioral task
behavioral1
Sample
393b161396a2af112a212d97f476d8b0.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
393b161396a2af112a212d97f476d8b0.exe
Resource
win10v2004-20231215-en
General
-
Target
393b161396a2af112a212d97f476d8b0
-
Size
88KB
-
MD5
393b161396a2af112a212d97f476d8b0
-
SHA1
0329475959dfec0bf3e9258714684a0d1e78d4cc
-
SHA256
0b3f5f0932f52ab9f490730b3199f2fa8d113f5bfb1ca2e8d2550ccaf77dcd07
-
SHA512
950c1936897d21e24e16b5ade3128f99ccbe16149fe251ecd937934f5c17d21f1c2a801dcab07026e781ce55eb8cf0106b34dd00718aa2073246551e2455fab6
-
SSDEEP
1536:cgfaCGe228JBJBpBUM0M0cHP3/nnXaI117i4WzqObn5XbHpiOGAX4:cK0KI11GlmOVXbHpvhX4
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 393b161396a2af112a212d97f476d8b0
Files
-
393b161396a2af112a212d97f476d8b0.exe windows:4 windows x86 arch:x86
7a5d7772963e0d67f878c90d37706b72
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
LoadIconA
msvbvm60
ord696
ord697
ord698
MethCallEngine
ord516
ord517
ord519
ord666
ord667
ord593
ord594
ord595
ord709
ord631
ord525
ord526
EVENT_SINK_AddRef
DllFunctionCall
EVENT_SINK_Release
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord712
ord608
ord531
ord716
ord717
ProcCallEngine
ord644
ord537
ord576
ord685
ord100
ord616
ord617
ord618
ord580
Sections
.text Size: 68KB - Virtual size: 67KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 15KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ