Static task
static1
Behavioral task
behavioral1
Sample
4c01a58c915b9ba70433b492b41d668baa3952bb49e76dcdf62ddcbcda0ee475.exe
Resource
win7-20240903-en
General
-
Target
4c01a58c915b9ba70433b492b41d668baa3952bb49e76dcdf62ddcbcda0ee475
-
Size
284KB
-
MD5
75595a4ebc9137daa39e031400b31248
-
SHA1
dd824c02974544ac33a1b704baa822425c53cd09
-
SHA256
4c01a58c915b9ba70433b492b41d668baa3952bb49e76dcdf62ddcbcda0ee475
-
SHA512
e8eaf97bb4d1cc4c6f3cab9a7b008c44bf9f0ee55e0f80ccef59e7d253ce5402a77c3b5b26b498f74edd3f81569922610773f4ad6064aaed3cbb71351a6804d2
-
SSDEEP
3072:rSQ0EWVwZhKxC5Rt+k60Zh+qw6PYSsszfHZTZJ2lC:rPA6wxmuJspr2l
Malware Config
Signatures
-
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
Processes:
resource 4c01a58c915b9ba70433b492b41d668baa3952bb49e76dcdf62ddcbcda0ee475
Files
-
4c01a58c915b9ba70433b492b41d668baa3952bb49e76dcdf62ddcbcda0ee475.exe windows:4 windows x86 arch:x86
94499ec57ca7f8a108e513ffe23240eb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
MethCallEngine
ord553
ord667
ord595
ord598
ord631
EVENT_SINK_AddRef
DllFunctionCall
EVENT_SINK_Release
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord712
ord534
ProcCallEngine
ord100
ord610
ord655
Sections
.text Size: 276KB - Virtual size: 274KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 23KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ