Static task
static1
Behavioral task
behavioral1
Sample
d43fa3e33e01d5b6f85e24e16da7d167.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d43fa3e33e01d5b6f85e24e16da7d167.exe
Resource
win10v2004-20240226-en
General
-
Target
d43fa3e33e01d5b6f85e24e16da7d167
-
Size
140KB
-
MD5
d43fa3e33e01d5b6f85e24e16da7d167
-
SHA1
d675a37f649a66b79ca872f48c70a3619793e824
-
SHA256
f160136f061eeafbed04e57a357b7e1b3cdd0e07982a2afca2c7c80cb5f29020
-
SHA512
8d83d116b654fa5cf7b554942cdcd61a4a160ae91a9e305770a743ee79bbf488179fab4bbc1171f32fcf8556a50db2a7b8a205f48be27f730f812636e829f64f
-
SSDEEP
3072:IMWckhRI3oyG3RJK89CUvAoIdnko2UoFtDSP:Ic4J5ciABZkq
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource d43fa3e33e01d5b6f85e24e16da7d167
Files
-
d43fa3e33e01d5b6f85e24e16da7d167.exe windows:4 windows x86 arch:x86
1393b9bcbc05e6fb2083bcb55e89de5b
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
MethCallEngine
ord516
ord518
ord666
ord593
ord594
ord595
ord631
ord526
EVENT_SINK_AddRef
ord529
DllFunctionCall
EVENT_SINK_Release
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord711
ord712
ord713
ord606
ord717
ProcCallEngine
ord644
ord537
ord648
ord570
ord573
ord685
ord578
ord100
ord616
ord619
ord581
Sections
.yfger8f Size: 64KB - Virtual size: 60KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.atad2 Size: - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
supN2 Size: 12KB - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ