Behavioral task
behavioral1
Sample
715a93006e29e3e11f3d79c6d62cff00N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
715a93006e29e3e11f3d79c6d62cff00N.exe
Resource
win10v2004-20240709-en
General
-
Target
715a93006e29e3e11f3d79c6d62cff00N.exe
-
Size
400KB
-
MD5
715a93006e29e3e11f3d79c6d62cff00
-
SHA1
587271103a923e5d1c921e6f2e91af58e00705f2
-
SHA256
a9987bc0d258e7edccad6749ff94bc23e994ed9da9fc79feae6b3e7bf1eb8e37
-
SHA512
dbfc2d1b3dc8967ad3568ea84d6f7de9edd74e255703820aba5ac6a206175219c171cf909f4cbc7b5e13a4c54c2ca72b0853882e3f506795f01cd76dd8769bf2
-
SSDEEP
6144:iJigOTJXYOaFs5Juh819hqkuGh2LeyIX:iJuUFs5Juh81GkhULe
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 715a93006e29e3e11f3d79c6d62cff00N.exe
Files
-
715a93006e29e3e11f3d79c6d62cff00N.exe.exe windows:4 windows x86 arch:x86
ec93d43ff758b5de7005a039a7bf80b3
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
ord697
MethCallEngine
ord628
ord661
ord662
EVENT_SINK_AddRef
DllFunctionCall
ord563
EVENT_SINK_Release
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord712
ProcCallEngine
ord100
ord546
Sections
UPX0 Size: 216KB - Virtual size: 216KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 104KB - Virtual size: 104KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE