Static task
static1
Behavioral task
behavioral1
Sample
Payload.exe
Resource
win10v2004-20231222-en
General
-
Target
Payload.exe
-
Size
1.1MB
-
MD5
8d34d20b2b869d529aee9ff69865d105
-
SHA1
85894619cd74dcd10284f77979836c43afa63aeb
-
SHA256
85fac793451ad6f70bafc59d89893e4ae528cd6dde73a12fe27cf4c92f9aac4d
-
SHA512
01c9f70e6b61828f889465e755e7017c415e42eb948bfdfb58e34768b96b52d0287575f76ce46353fd17b38738deacba6221e171c29c7b623969ba5304850f70
-
SSDEEP
24576:9uDj/kQ9SbFJ4laWTtHVB/RiaHSIBcP6ILgtU2rtQR7gVRETTmNf:OEbFJ4laWTtHvTlBcP6ILgsR8VREGN
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource Payload.exe
Files
-
Payload.exe.exe windows:4 windows x86 arch:x86
cfecc3fed311930f3a52f084bbbc0ae6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
MethCallEngine
ord666
ord595
ord598
ord526
EVENT_SINK_AddRef
DllFunctionCall
EVENT_SINK_Release
ord600
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord711
ord716
ord717
ProcCallEngine
ord535
ord100
Sections
.text Size: 8KB - Virtual size: 7KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 1.1MB - Virtual size: 1.1MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ