Static task
static1
Behavioral task
behavioral1
Sample
3aaaf0d793f7263f70695b149e1f6ad6dbde68f3cd3014f767adfddca1c70827.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
3aaaf0d793f7263f70695b149e1f6ad6dbde68f3cd3014f767adfddca1c70827.exe
Resource
win10v2004-20220812-en
General
-
Target
3aaaf0d793f7263f70695b149e1f6ad6dbde68f3cd3014f767adfddca1c70827
-
Size
24KB
-
MD5
777fe4330e9654f587c06fcae53da97c
-
SHA1
3e3d69b62d6319b3f22b238055c1182f08013ba8
-
SHA256
3aaaf0d793f7263f70695b149e1f6ad6dbde68f3cd3014f767adfddca1c70827
-
SHA512
39dab252643e65b064941a654e50a9991cdb7c2f96c292cff60c18c8a13b3678a9d3d6621b16bd0312f6f36b951f65bdff4c29bd77a706aae1adc35080f3417b
-
SSDEEP
192:Urtt+ELGsDi8DHbpI3RZLt9FgEmaNjZoW3DwraB/9K:UrttDD74mVaNj2W3Dwre/9K
Malware Config
Signatures
Files
-
3aaaf0d793f7263f70695b149e1f6ad6dbde68f3cd3014f767adfddca1c70827.exe windows x86
91e6d8b6805303b55c3f698117c06f00
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
ord690
MethCallEngine
ord516
ord709
ord632
ord526
EVENT_SINK_AddRef
ord528
ord529
DllFunctionCall
EVENT_SINK_Release
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord711
ord712
ord717
ProcCallEngine
ord644
ord100
ord689
ord610
ord617
Sections
.text Size: 12KB - Virtual size: 10KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ