Static task
static1
Behavioral task
behavioral1
Sample
1a59e0b32e50b3e882074049b27adcbaadf9577412d1c49f6c5a3052b5eae49b.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
1a59e0b32e50b3e882074049b27adcbaadf9577412d1c49f6c5a3052b5eae49b.exe
Resource
win10v2004-20240508-en
General
-
Target
1a59e0b32e50b3e882074049b27adcbaadf9577412d1c49f6c5a3052b5eae49b
-
Size
124KB
-
MD5
d88d236092dd81041fdc498343bf97e6
-
SHA1
9cf483966b9f97b6fb9d11bf4857fcf63cb4ea05
-
SHA256
1a59e0b32e50b3e882074049b27adcbaadf9577412d1c49f6c5a3052b5eae49b
-
SHA512
9e9fd0b819142ca7948ecd95fcbcd700fb37bbd24c922d75224b71d50ad66b281f7c42ae7574711dd95538fb665be6a28af2bb274f2990ebf87befa6fbe1404c
-
SSDEEP
1536:Tq6v6ubf/JChzd52RgA2gV/skvZCLAPZtQrfgn:TXcVn2hUkBBb
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 1a59e0b32e50b3e882074049b27adcbaadf9577412d1c49f6c5a3052b5eae49b
Files
-
1a59e0b32e50b3e882074049b27adcbaadf9577412d1c49f6c5a3052b5eae49b.exe windows:4 windows x86 arch:x86
3723f06690e002f4829c7ca43643c5d6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
__vbaVarSub
ord690
__vbaStrI2
ord691
_CIcos
_adj_fptan
__vbaVarMove
__vbaStrI4
__vbaFreeVar
__vbaStrVarMove
__vbaLenBstr
__vbaEnd
__vbaFreeVarList
_adj_fdiv_m64
__vbaFreeObjList
ord516
_adj_fprem1
ord518
__vbaResume
__vbaStrCat
ord660
__vbaSetSystemError
__vbaRecDestruct
__vbaHresultCheckObj
_adj_fdiv_m32
__vbaAryDestruct
ord593
__vbaExitProc
ord594
__vbaOnError
__vbaObjSet
ord595
_adj_fdiv_m16i
__vbaObjSetAddref
_adj_fdivr_m16i
ord520
__vbaBoolVarNull
_CIsin
__vbaErase
__vbaVarCmpGt
ord632
__vbaChkstk
__vbaCyVar
ord526
__vbaFileClose
EVENT_SINK_AddRef
__vbaGenerateBoundsError
__vbaCyI2
__vbaStrCmp
__vbaVarTstEq
ord560
__vbaPutOwner4
__vbaI2I4
DllFunctionCall
__vbaCySub
__vbaRedimPreserve
_adj_fpatan
__vbaRedim
EVENT_SINK_Release
__vbaNew
ord600
_CIsqrt
__vbaVarAnd
EVENT_SINK_QueryInterface
__vbaFpCmpCy
__vbaExceptHandler
__vbaStrToUnicode
ord712
_adj_fprem
_adj_fdivr_m64
__vbaI2Str
ord714
ord608
__vbaFPException
__vbaInStrVar
__vbaStrVarVal
__vbaVarCat
__vbaGetOwner4
ord535
__vbaI2Var
ord645
_CIlog
__vbaErrorOverflow
__vbaFileOpen
__vbaR8Str
__vbaNew2
ord648
_adj_fdiv_m32i
_adj_fdivr_m32i
__vbaStrCopy
__vbaI4Str
__vbaFreeStrList
_adj_fdivr_m32
_adj_fdiv_r
ord685
ord100
__vbaVarTstNe
__vbaI4Var
__vbaVarCmpEq
ord689
ord610
__vbaVarAdd
__vbaVarDup
__vbaFreeVarg
__vbaStrToAnsi
__vbaFpI4
__vbaR8IntI2
ord617
_CIatan
__vbaI2ErrVar
__vbaStrMove
__vbaCastObj
ord619
_allmul
_CItan
ord546
_CIexp
__vbaMidStmtBstr
__vbaFreeObj
__vbaFreeStr
Sections
.text Size: 112KB - Virtual size: 109KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ