Static task
static1
Behavioral task
behavioral1
Sample
03b73349a842f903187f0ee5dc8b7ae0N.exe
Behavioral task
behavioral2
Sample
03b73349a842f903187f0ee5dc8b7ae0N.exe
General
-
Target
03b73349a842f903187f0ee5dc8b7ae0N.exe
-
Size
634KB
-
MD5
03b73349a842f903187f0ee5dc8b7ae0
-
SHA1
48b70ba858a9655d1e38590635f1c985e746d403
-
SHA256
dc8c4b3b0339da1e02ba14a11246316af22206249fb4f886cc0cadd7580bf8c2
-
SHA512
ca90bc164e90888173dd5e52af820267f94c15ef96e99a7f94f39862ee832bd8be7df811adc802e7120db4b05072e7898e5ff232db1f11912a218fe455a95645
-
SSDEEP
12288:WrCXwDisaiUibSSp1cyBLlhxGTn8L1jd9bAyvD/UcwBl:WHbH1cyBLTPRVAewBl
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 03b73349a842f903187f0ee5dc8b7ae0N.exe
Files
-
03b73349a842f903187f0ee5dc8b7ae0N.exe.exe windows:4 windows x86 arch:x86
c5971094c704667bdcfe54db7e09672e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
EVENT_SINK_GetIDsOfNames
ord690
ord588
ord697
MethCallEngine
EVENT_SINK_Invoke
ord516
ord519
ord660
ord662
ord558
ord667
Zombie_GetTypeInfo
ord669
ord591
EVENT_SINK2_Release
ord593
ord594
ord595
ord598
ord520
ord523
ord709
ord631
ord632
ord525
ord526
EVENT_SINK_AddRef
ord527
ord528
ord529
DllFunctionCall
ord563
ord568
Zombie_GetTypeInfoCount
EVENT_SINK_Release
ord600
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord711
ord712
ord713
ord606
ord607
ord608
ord530
ord716
ord531
ord717
ord532
ord319
ord533
ProcCallEngine
ord535
ord536
ord644
ord537
ord538
ord645
ord647
ord648
ord571
ord572
EVENT_SINK2_AddRef
ord578
ord685
ord100
ord689
ord610
ord320
ord321
ord616
ord617
ord618
ord543
ord650
ord544
ord546
ord547
ord580
ord581
Sections
.text Size: 328KB - Virtual size: 327KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 29KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 100KB - Virtual size: 98KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ