Static task
static1
Behavioral task
behavioral1
Sample
deb16e767f068eb2383f6cd3d0acdf18.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
deb16e767f068eb2383f6cd3d0acdf18.exe
Resource
win10v2004-20240226-en
General
-
Target
deb16e767f068eb2383f6cd3d0acdf18
-
Size
90KB
-
MD5
deb16e767f068eb2383f6cd3d0acdf18
-
SHA1
dbab63eddad1048a15bfa95ef0d2957d3e1df631
-
SHA256
9982322f09997d3bfa87d6b9e95d4dc5d0e3ca227c7bbea402182270d5db2e96
-
SHA512
ca6074054ff71e2db852c001f8f68ca46ab78526608673753a6dc3a035b1aba2080757332fd9b243ec9f01d935005fe8929d71ad766586688664ac5e0725e463
-
SSDEEP
1536:IbaN8xn3Wiom0NU6raiEj7jCZ8PJpfB8Bt1BQqX9GNpixMgeJ1:TCWiX0NU6Xg7jCqduQA8Ax981
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource deb16e767f068eb2383f6cd3d0acdf18
Files
-
deb16e767f068eb2383f6cd3d0acdf18.exe windows:4 windows x86 arch:x86
ce50dd18f04ebe9df42f72ce59f980f4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
MethCallEngine
ord516
ord631
ord526
EVENT_SINK_AddRef
DllFunctionCall
EVENT_SINK_Release
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord711
ord712
ord717
ProcCallEngine
ord644
ord537
ord573
ord578
ord100
ord619
ord581
Sections
.text Size: 24KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: 5KB - Virtual size: 8KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.udata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE