Behavioral task
behavioral1
Sample
78e4deb6ec39aa0acdde56a331930b7e.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
78e4deb6ec39aa0acdde56a331930b7e.exe
Resource
win10v2004-20231215-en
General
-
Target
78e4deb6ec39aa0acdde56a331930b7e
-
Size
241KB
-
MD5
78e4deb6ec39aa0acdde56a331930b7e
-
SHA1
565be8c1b57c1efe3eb6dcf2ed321f18f57628ea
-
SHA256
75ec847a82139863f118a40a559d5d091cb44d082c0acff7ebf1190dba65dfbc
-
SHA512
9880cf1002e82284628d72ca4288fee4d3ebba0ee5f275cd351fc2ea61059678e92d246a63e2925ebb5c636739562f90e6474af45830d3b067b2e7142a115b9e
-
SSDEEP
3072:l7KR5PG8h8ic5WH4JzswaAhUkkSzE3iUXaPjnLc:l7Kb8rSmQwX+kUX8jnQ
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 78e4deb6ec39aa0acdde56a331930b7e
Files
-
78e4deb6ec39aa0acdde56a331930b7e.exe windows:4 windows x86 arch:x86
6035807aecd071e6aaa0c0f0b5d9de8a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm50
EVENT_SINK_GetIDsOfNames
MethCallEngine
EVENT_SINK_Invoke
Zombie_GetTypeInfo
EVENT_SINK_AddRef
DllFunctionCall
Zombie_GetTypeInfoCount
EVENT_SINK_Release
EVENT_SINK_QueryInterface
__vbaExceptHandler
ProcCallEngine
Sections
UPX0 Size: 228KB - Virtual size: 228KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 11KB - Virtual size: 12KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.avp Size: 1024B - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE