Static task
static1
Behavioral task
behavioral1
Sample
7eab95f9940cdf3108dfdaa61deb2405.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7eab95f9940cdf3108dfdaa61deb2405.exe
Resource
win10v2004-20231215-en
General
-
Target
7eab95f9940cdf3108dfdaa61deb2405
-
Size
584KB
-
MD5
7eab95f9940cdf3108dfdaa61deb2405
-
SHA1
d8ce11670594bdae9c92927d8d5285c5fc6850ab
-
SHA256
7663d73c67236cae7891b4d5cb8289024da60a2227a189293a1dd9d0e018e710
-
SHA512
d51b19731092d77484b3d203c374f2de3c826f18784d5b048484b861b3485844ab444a624585abba880d3ce2f01f94a0fdda3a7447669ca45097632fba09c771
-
SSDEEP
6144:mtlpQ327E34r9KbIMhusR/gNxTBRQfrPz19ewYWWr:mtoIE3YAJustgNtBRWz10fWW
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 7eab95f9940cdf3108dfdaa61deb2405
Files
-
7eab95f9940cdf3108dfdaa61deb2405.exe windows:4 windows x86 arch:x86
5e9b446af662287109b36abfbfeb116c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
MethCallEngine
ord593
ord594
ord598
ord526
EVENT_SINK_AddRef
DllFunctionCall
EVENT_SINK_Release
EVENT_SINK_QueryInterface
__vbaExceptHandler
ProcCallEngine
ord645
ord576
ord100
ord617
ord542
ord545
ord546
Sections
.text Size: 136KB - Virtual size: 136KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 80KB - Virtual size: 78KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.ldata Size: 100KB - Virtual size: 100KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
sjuihjd Size: 124KB - Virtual size: 124KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
suxlgpc Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
wycfhvm Size: 84KB - Virtual size: 112KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE