Behavioral task
behavioral1
Sample
f713809dea449815a501976935a6b8ef96ba3921c91989994865ab1ee6c4726f.exe
Resource
win7-20240220-en
General
-
Target
f713809dea449815a501976935a6b8ef96ba3921c91989994865ab1ee6c4726f
-
Size
184KB
-
MD5
23200d05e67026e395f5508e81a6f261
-
SHA1
84c0011593696bc6cb3fcfe57edf5eb4fbf8b4a5
-
SHA256
f713809dea449815a501976935a6b8ef96ba3921c91989994865ab1ee6c4726f
-
SHA512
92ca46a53238d28c98c6b16ac075d1c81534408e0f10a04de8195c6e26ee735e5af2d78b05357fac0d58c9b452e0d670ed60d3040fd29fb95a40cea56e47e5d6
-
SSDEEP
1536:Eq37dumBoEHkqWke1C4kqUDA2n6J8U6FjSHyI9Ng3Xmx:n35PBoEW1TBUP6n6FWlXi
Malware Config
Signatures
-
Processes:
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource f713809dea449815a501976935a6b8ef96ba3921c91989994865ab1ee6c4726f
Files
-
f713809dea449815a501976935a6b8ef96ba3921c91989994865ab1ee6c4726f.exe windows:4 windows x86 arch:x86
d16b77aee0fd37b733aea9c3279085f9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
MethCallEngine
ord516
ord518
ord553
ord595
ord520
ord522
ord524
ord709
ord632
ord526
EVENT_SINK_AddRef
ord528
ord529
DllFunctionCall
EVENT_SINK_Release
ord600
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord711
ord712
ord607
ord608
ord716
ProcCallEngine
ord645
ord576
ord577
ord100
ord579
ord610
ord612
ord613
ord617
ord619
ord542
ord544
ord545
ord547
ord580
Sections
UPX0 Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 108KB - Virtual size: 108KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE