Static task
static1
Behavioral task
behavioral1
Sample
8a42fea28b1efe3368fa3954aab69f70N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
8a42fea28b1efe3368fa3954aab69f70N.exe
Resource
win10v2004-20240709-en
General
-
Target
8a42fea28b1efe3368fa3954aab69f70N.exe
-
Size
139KB
-
MD5
8a42fea28b1efe3368fa3954aab69f70
-
SHA1
6e7a984d28461bc20db412ab638fb03b5fb4c7f4
-
SHA256
917c102a3885ba9041cff8c5770dd96c8a9da58dcf74f9ac4d396b3c2ab6542a
-
SHA512
7c87ca5ace3127ebf1294e02ff19cb93d52b2a0122e92e3fed4cf20d7cb284714e8ab96115dba0553d10e2ca7c7eaf379842783abbaa3f7cd4b442bb64f26d7b
-
SSDEEP
1536:1Wwa/6Pv9MTKC8U7l0m6272gjwZgopChyXdSwkja8jroAbRB+XWCQLZeIdSwkU:cz/6tMTxb77772CWChgS3FRBLJSS
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource 8a42fea28b1efe3368fa3954aab69f70N.exe
Files
-
8a42fea28b1efe3368fa3954aab69f70N.exe.exe windows:4 windows x86 arch:x86
fce46a6dd6a779730657e2b99c66e821
Headers
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
msvbvm60
MethCallEngine
ord516
ord669
ord593
ord594
ord598
ord523
ord631
ord525
ord632
ord526
EVENT_SINK_AddRef
ord528
DllFunctionCall
EVENT_SINK_Release
ord600
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord608
ProcCallEngine
ord537
ord645
ord100
ord616
ord617
ord618
ord619
ord542
ord543
ord544
ord546
ord547
Sections
.text Size: 72KB - Virtual size: 72KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.aspack Size: 27KB - Virtual size: 28KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.qnk Size: - Virtual size: 4KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE