Static task
static1
Behavioral task
behavioral1
Sample
afe140145d5e1df1b2c1f380c8c05a2a05e520a595ddfd03b11913e2b978a8b5.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
afe140145d5e1df1b2c1f380c8c05a2a05e520a595ddfd03b11913e2b978a8b5.exe
Resource
win10v2004-20240802-en
General
-
Target
afe140145d5e1df1b2c1f380c8c05a2a05e520a595ddfd03b11913e2b978a8b5
-
Size
11.3MB
-
MD5
db1d78a9c078240e3c23825e3ddf7a35
-
SHA1
7a8d07fff5a8b3b7aba1735e00613731178efbda
-
SHA256
afe140145d5e1df1b2c1f380c8c05a2a05e520a595ddfd03b11913e2b978a8b5
-
SHA512
de5dc15506ffda47ed4a76edc602b0549700df96baa988281dd4dfc29784d1a1a9a08a8ca6a4ca54db2c342296cdecd8eab6ec13e6bf90f2df55501f57d39366
-
SSDEEP
196608:ANu0Pob/g92aU0XattPga7+kNzBGSJcfbanxbniJIBP33xHlVW2zfQ0XgYY:FDglU0XaTPgaNzMSoaV3PnxHHWYQQ6
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource afe140145d5e1df1b2c1f380c8c05a2a05e520a595ddfd03b11913e2b978a8b5
Files
-
afe140145d5e1df1b2c1f380c8c05a2a05e520a595ddfd03b11913e2b978a8b5.exe windows:4 windows x86 arch:x86
65b57bbfe38405b7d1ad79fc99398cde
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
VirtualAlloc
VirtualFree
VirtualProtect
MapViewOfFile
UnmapViewOfFile
GetModuleFileNameA
GetModuleFileNameW
GetModuleHandleA
GetProcAddress
LoadLibraryA
CreateFileA
CreateFileW
WriteFile
CloseHandle
GetLocalTime
VirtualQuery
CreateFileMappingW
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
GetCurrentProcess
FlushInstructionCache
GetSystemInfo
VirtualProtectEx
user32
wsprintfA
shlwapi
ord158
msvbvm60
ord582
__vbaStrI2
__vbaR8ForNextCheck
__vbaNextEachAry
__vbaVarMove
__vbaVarVargNofree
__vbaAryMove
__vbaStrVarMove
__vbaI2Abs
__vbaWriteFile
__vbaHresultCheckObj
__vbaVargVarCopy
__vbaLateMemSt
__vbaExitProc
__vbaI4Abs
__vbaObjSet
_adj_fdiv_m16i
__vbaObjSetAddref
__vbaVarIndexLoad
__vbaFpR4
__vbaBoolVar
__vbaStrTextCmp
__vbaBoolVarNull
__vbaErase
__vbaNextEachCollObj
__vbaLateMemStAd
__vbaFileClose
ord528
__vbaStrCmp
__vbaPrintObj
__vbaVarOr
__vbaNew
__vbaUI1I2
__vbaStrUI1
__vbaPrintFile
__vbaInputFile
__vbaR4ErrVar
__vbaLateIdStAd
__vbaVarDiv
ord608
__vbaVarCmpLe
__vbaInStrVar
__vbaVarCat
__vbaCheckType
__vbaLsetFixstrFree
_CIlog
__vbaErrorOverflow
__vbaVar2Vec
__vbaInStr
_adj_fdiv_m32i
__vbaStrCopy
__vbaI4Str
_adj_fdivr_m32
__vbaVarTstNe
__vbaVarCmpEq
__vbaR4Sgn
__vbaAryVarVarg
__vbaVarLateMemCallLd
__vbaLateMemCallLd
__vbaCastObj
__vbaStrMove
__vbaR8IntI4
__vbaVarNeg
_allmul
__vbaLateIdSt
__vbaLateMemCallSt
__vbaUI1Var
__vbaAryUnlock
Sections
.text Size: - Virtual size: 6.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 174KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.virbox Size: - Virtual size: 5.3MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.vdata0 Size: - Virtual size: 8.3MB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.vdata1 Size: - Virtual size: 14KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.virbox3 Size: 216KB - Virtual size: 213KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ