Static task
static1
Behavioral task
behavioral1
Sample
feb6ff2f34c756fed07e384297a92fd1f902ef813776d9c4522c52b946c9462b.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
feb6ff2f34c756fed07e384297a92fd1f902ef813776d9c4522c52b946c9462b.exe
Resource
win10v2004-20240802-en
General
-
Target
feb6ff2f34c756fed07e384297a92fd1f902ef813776d9c4522c52b946c9462b
-
Size
440KB
-
MD5
a77df074910a77a935b6525fc3dd7dd4
-
SHA1
d4ebcd6413ec16db23335f323ede9fd3503fa5e9
-
SHA256
feb6ff2f34c756fed07e384297a92fd1f902ef813776d9c4522c52b946c9462b
-
SHA512
df9e9e770f0487dd771cb025727a0ed2ee34717986352c9b8fdc9b87a44d78502ec0e046508420209e71d0132123998c38823d922ede5db21dc0b41c54bb4a58
-
SSDEEP
6144:/NF4mcxORh/pv4sTdhqpY+3/J0yfghEVXorMGPT8laonvhX0lXOO+5t/AAHT:/8ihl3hOPy+
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource feb6ff2f34c756fed07e384297a92fd1f902ef813776d9c4522c52b946c9462b
Files
-
feb6ff2f34c756fed07e384297a92fd1f902ef813776d9c4522c52b946c9462b.exe windows:4 windows x86 arch:x86
0899e0f137aedbcba68714317c1a9f0d
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
ord696
ord697
ord698
MethCallEngine
ord516
ord517
ord626
ord519
ord660
ord557
ord665
ord558
ord667
ord593
ord300
ord594
ord304
ord598
ord306
ord521
ord707
ord523
ord709
ord631
ord525
ord526
EVENT_SINK_AddRef
ord527
ord561
DllFunctionCall
EVENT_SINK_Release
ord600
ord601
ord310
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord710
ord312
ord711
ord712
ord713
ord714
ord608
ord716
ord531
ord717
ProcCallEngine
ord535
ord644
ord537
ord645
ord646
ord681
ord576
ord685
ord100
ord689
ord613
ord616
ord618
ord542
ord650
ord545
ord581
Sections
.text Size: 408KB - Virtual size: 407KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 26KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ