Static task
static1
Behavioral task
behavioral1
Sample
5d6869700ee8b5e589326e08b0a97bf1a135daaf397ea9e68fbf2c1fd017cae9.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
5d6869700ee8b5e589326e08b0a97bf1a135daaf397ea9e68fbf2c1fd017cae9.exe
Resource
win10v2004-20240508-en
General
-
Target
5d6869700ee8b5e589326e08b0a97bf1a135daaf397ea9e68fbf2c1fd017cae9
-
Size
11.9MB
-
MD5
15d395d97c0b0175054f19533aa6e931
-
SHA1
c8d1b568160de79f6486288db8bdd7d2bafb22e0
-
SHA256
5d6869700ee8b5e589326e08b0a97bf1a135daaf397ea9e68fbf2c1fd017cae9
-
SHA512
83c687a6ee76be6aabf75c0d37d79313b9070db0fd26c036b11dbbcbd7f646cc0ed1882b5d0bbce78ce8eae9bd1a1192c9ee4493bf40d375f1d3ec7a6a46d707
-
SSDEEP
196608:ikg259Om19RAEk4oQSmcCnjsxa+ok9X8lPK5DMlNcDNn/5IF7NMrCKv:ikXL19Sj1ypgslPKhMOBkWTv
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 5d6869700ee8b5e589326e08b0a97bf1a135daaf397ea9e68fbf2c1fd017cae9
Files
-
5d6869700ee8b5e589326e08b0a97bf1a135daaf397ea9e68fbf2c1fd017cae9.exe windows:4 windows x86 arch:x86
f9885693e0a51d713ede9d737508c591
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAlloc
VirtualFree
VirtualProtect
MapViewOfFile
UnmapViewOfFile
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
GetProcAddress
LoadLibraryA
CreateFileA
CreateFileW
WriteFile
CloseHandle
GetLocalTime
VirtualQuery
CreateFileMappingW
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetCurrentProcess
FlushInstructionCache
GetSystemInfo
VirtualProtectEx
user32
wsprintfA
shlwapi
ord158
msvbvm60
__vbaVarTstGt
__vbaStrI2
__vbaI2Sgn
__vbaStrVarMove
__vbaRecAnsiToUni
__vbaI4Sgn
__vbaVarTextTstEq
__vbaStrDate
__vbaHresultCheckObj
__vbaVargVarCopy
__vbaLenVar
__vbaLateMemSt
__vbaStrBool
__vbaObjSet
_adj_fdiv_m16i
__vbaObjSetAddref
__vbaStrFixstr
__vbaStrTextCmp
__vbaRefVarAry
ord631
__vbaErase
__vbaLateMemStAd
__vbaVarAbs
__vbaVarLateMemSt
__vbaNew
_CIsqrt
__vbaStrUI1
ord712
__vbaR4ErrVar
_adj_fprem
__vbaI2Str
ord608
__vbaVarCmpLe
__vbaFPException
__vbaInStrVar
__vbaUbound
__vbaVarCat
__vbaDateVar
__vbaLsetFixstrFree
ord645
__vbaFileOpen
__vbaVarLateMemCallLdRf
__vbaNew2
_adj_fdiv_m32i
__vbaI4Str
__vbaVarNot
_adj_fdivr_m32
__vbaVarTstNe
__vbaForEachAry
__vbaLateMemCall
__vbaVarDup
__vbaFpI2
__vbaRecDestructAnsi
_CIatan
__vbaCastObj
__vbaStrVarCopy
__vbaForEachVar
__vbaVarNeg
ord650
__vbaVarLateMemCallSt
__vbaAryRecCopy
__vbaFPInt
Sections
.text Size: - Virtual size: 12.9MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 276KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.virbox Size: - Virtual size: 8.7MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vdata0 Size: - Virtual size: 6.4MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vdata1 Size: - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.virbox3 Size: 220KB - Virtual size: 218KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ