Static task
static1
Behavioral task
behavioral1
Sample
a16a413150c616e044925eded1b38756.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
a16a413150c616e044925eded1b38756.exe
Resource
win10v2004-20240221-en
General
-
Target
a16a413150c616e044925eded1b38756
-
Size
64KB
-
MD5
a16a413150c616e044925eded1b38756
-
SHA1
d640b0268ffbe4e97146d6c325705ec63c3b4936
-
SHA256
9900deef5bbccfd49f5d24add201d6ae3bcae2053166cf4b1bab3a7d6c292cb1
-
SHA512
6d28f0ff07b58f06aca8a85f1e45a7c5b75439ac0e6718a24361c91e7b14f1618396dc4717bedcd4b795932e90e0733fc07f6ac46e1904d61630e2025bb2c5b3
-
SSDEEP
768:oI/+hbyANvUmkPduckcgWG21EuIgcIzRjAyj1jeDYxoxExJdeV:sbtN8x0utzrj1jpxom
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource a16a413150c616e044925eded1b38756
Files
-
a16a413150c616e044925eded1b38756.exe windows:4 windows x86 arch:x86
455e3c87c5118c04ced3f6d538c9c2e1
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_BYTES_REVERSED_LO
IMAGE_FILE_SYSTEM
Imports
msvbvm60
MethCallEngine
ord631
ord526
EVENT_SINK_AddRef
DllFunctionCall
EVENT_SINK_Release
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord711
ord712
ord717
ProcCallEngine
ord644
ord537
ord573
ord578
ord100
ord619
ord581
Sections
.scpack Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.TEXT Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.DATA Size: 8KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.r2rc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ASPACK Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.ADATA Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE