Static task
static1
Behavioral task
behavioral1
Sample
82b59392dcf285dc8d6d6bf740149847bed2630cd95dbf6d1687529290e02d67.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
82b59392dcf285dc8d6d6bf740149847bed2630cd95dbf6d1687529290e02d67.exe
Resource
win10v2004-20240319-en
General
-
Target
82b59392dcf285dc8d6d6bf740149847bed2630cd95dbf6d1687529290e02d67
-
Size
528KB
-
MD5
e0aca6223d945ab9eb2cd634e3fdefe9
-
SHA1
cf2ccb807eb56064a59b9218c9e80b2e34ccaff7
-
SHA256
82b59392dcf285dc8d6d6bf740149847bed2630cd95dbf6d1687529290e02d67
-
SHA512
6aa6c140528c2961e839c6cb789c644badd020853fe2f8e24a52e2d2ebec7727395b5d09be474fd4f3339dcdfc4cba00bfaa039d5ebd392f3708e1379264ea7a
-
SSDEEP
12288:u5kMqeOESeQ2fFq2omkohLyp8zPPSUSQ2TwP:XMQmfJomkohL7mwP
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 82b59392dcf285dc8d6d6bf740149847bed2630cd95dbf6d1687529290e02d67
Files
-
82b59392dcf285dc8d6d6bf740149847bed2630cd95dbf6d1687529290e02d67.exe windows:4 windows x86 arch:x86
5ae568d8bc96f9f31d9802a1e18dc78c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
ord589
MethCallEngine
ord516
ord517
ord518
ord519
ord553
ord660
ord661
ord662
ord557
ord669
ord591
ord300
ord595
ord596
ord598
ord599
ord306
ord520
ord521
ord523
ord709
ord631
ord632
ord525
ord526
EVENT_SINK_AddRef
ord527
ord528
ord560
ord561
DllFunctionCall
EVENT_SINK_Release
ord600
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord711
ord605
ord712
ord606
ord713
ord607
ord608
ord716
ord717
ord534
ProcCallEngine
ord537
ord538
ord645
ord648
ord681
ord577
ord685
ord100
ord687
ord613
ord616
ord617
ord618
ord619
ord542
ord650
ord651
ord545
ord546
ord581
Sections
.text Size: 520KB - Virtual size: 518KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ