Static task
static1
Behavioral task
behavioral1
Sample
HIROSHI3.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
HIROSHI3.exe
Resource
win10v2004-20231222-en
General
-
Target
HIROSHI3.exe
-
Size
543KB
-
MD5
891cb442484c2fbde98cdc96ec19a1f1
-
SHA1
de547b47ae112d0a9a2c6be3109f85bf9ceec005
-
SHA256
016c02b11ed14355d4b5463e31ffaf232753bf8756d796b23347ea1ed406aa1b
-
SHA512
052368cf74a5a73c324a620b4dd50873459e65bf94c875567cac096d66de5c3fd274d13736124dcc1bef2419d94c46f2265e93fbb352f5b257c423a228fa0556
-
SSDEEP
6144:zNBI5vXYuwMvq6iARr1NGHI9lChOrEf7dhdaN1DiBoAm:zN+5vYu5DiCPlgOrQ7FGBAm
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource HIROSHI3.exe
Files
-
HIROSHI3.exe.exe windows:4 windows x86 arch:x86
4d23fab0881f56a7049de46ea1641459
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
MethCallEngine
ord526
EVENT_SINK_AddRef
DllFunctionCall
EVENT_SINK_Release
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord711
ord609
ProcCallEngine
ord685
ord100
ord616
ord650
msvcr100
strftime
Sections
.text Size: 488KB - Virtual size: 485KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 12KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.l1 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE