Behavioral task
behavioral1
Sample
b055a008b434df73ec2df788254b2eb0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
b055a008b434df73ec2df788254b2eb0N.exe
Resource
win10v2004-20240709-en
General
-
Target
b055a008b434df73ec2df788254b2eb0N.exe
-
Size
136KB
-
MD5
b055a008b434df73ec2df788254b2eb0
-
SHA1
9427b801209c0c03e5d73f00c13997e7dfc6c625
-
SHA256
4cb7ba2fb6d320221bcc710065102759b2b23b875eece21c44abaf2bc3a2230c
-
SHA512
9060abffe40a06b187630782e3b4522c7695243cf4fa34fbf876d3f6498ceeaa47136fba0afdfd3d5aa1b2f214300022170aed7549e80caebd7684b2f06c3af1
-
SSDEEP
768:ojw+4kIfHn2Y+DDWiJ2H4wf2VBR8ZVqCT9TJuI0Sf9wnBxEZAHni:ojw+RIvnJ+PhJ2H/WR8ZStnMZCni
Malware Config
Signatures
-
resource yara_rule sample upx -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource b055a008b434df73ec2df788254b2eb0N.exe
Files
-
b055a008b434df73ec2df788254b2eb0N.exe.exe windows:4 windows x86 arch:x86
027cd7dd38296da5131da17c169aac37
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
MethCallEngine
ord516
ord518
ord593
ord594
ord595
ord520
ord631
ord632
ord525
ord526
EVENT_SINK_AddRef
ord529
DllFunctionCall
EVENT_SINK_Release
ord600
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord711
ord712
ord608
ord716
ProcCallEngine
ord536
ord645
ord570
ord576
ord100
ord617
ord619
ord542
ord545
ord546
ord547
ord581
Sections
UPX0 Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
UPX1 Size: 16KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 76KB - Virtual size: 76KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE