Static task
static1
Behavioral task
behavioral1
Sample
4d69ee5a1056784b46e76865390662bdbaca2941dff98f21a4bed7e65f08a0bd.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
4d69ee5a1056784b46e76865390662bdbaca2941dff98f21a4bed7e65f08a0bd.exe
Resource
win10v2004-20220812-en
General
-
Target
4d69ee5a1056784b46e76865390662bdbaca2941dff98f21a4bed7e65f08a0bd
-
Size
88KB
-
MD5
a0a574cdccd8c0d8e76d7ee1169f30ce
-
SHA1
d35e4a050c7ac6d49f979c5b49cc1b9ce0fcdf05
-
SHA256
4d69ee5a1056784b46e76865390662bdbaca2941dff98f21a4bed7e65f08a0bd
-
SHA512
86a7e5f04651dd6484f4c05e4cb12271e3726c1da89a485b6cf4a32dc83b225b34b3acc001ae56bcb589031375fbc2697d6d77f701cd990495e44da523baca32
-
SSDEEP
1536:uNPgy4v88Iwndp6VdQXwuqWG9GHMhj0++ZvIll:+gykzIweVaLqoHMh/+ZvI
Malware Config
Signatures
Files
-
4d69ee5a1056784b46e76865390662bdbaca2941dff98f21a4bed7e65f08a0bd.exe windows x86
83deeeaf15d3c47fd7ac70b5ffe5dc1f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
oleaut32
VariantCopy
msvbvm60
EVENT_SINK_GetIDsOfNames
__vbaNextEachAry
_CIcos
_adj_fptan
__vbaVarMove
__vbaStrI4
__vbaHresultCheck
__vbaVarVargNofree
__vbaAryMove
__vbaFreeVar
__vbaLenBstr
__vbaStrVarMove
__vbaAptOffset
__vbaFreeVarList
_adj_fdiv_m64
EVENT_SINK_Invoke
__vbaRaiseEvent
__vbaFreeObjList
ord516
ord517
_adj_fprem1
__vbaVarSetVarAddref
__vbaCopyBytes
__vbaResume
__vbaStrCat
__vbaSetSystemError
__vbaHresultCheckObj
_adj_fdiv_m32
__vbaAryVar
Zombie_GetTypeInfo
__vbaAryDestruct
__vbaVarIndexLoadRefLock
ord591
ord592
__vbaExitProc
ord300
ord301
__vbaObjSet
__vbaOnError
_adj_fdiv_m16i
ord303
__vbaObjSetAddref
_adj_fdivr_m16i
ord598
ord306
ord307
ord309
__vbaRefVarAry
_CIsin
ord631
ord709
__vbaErase
ord525
__vbaVarZero
__vbaChkstk
ord526
__vbaFileClose
EVENT_SINK_AddRef
ord527
__vbaGenerateBoundsError
__vbaStrCmp
__vbaVarTstEq
__vbaAryConstruct2
__vbaObjVar
__vbaPrintObj
DllFunctionCall
ord563
__vbaCastObjVar
__vbaLbound
__vbaRedimPreserve
_adj_fpatan
Zombie_GetTypeInfoCount
__vbaRedim
EVENT_SINK_Release
__vbaNew
_CIsqrt
__vbaObjIs
EVENT_SINK_QueryInterface
__vbaStr2Vec
__vbaExceptHandler
ord711
ord712
ord605
__vbaStrToUnicode
__vbaPrintFile
ord606
_adj_fprem
_adj_fdivr_m64
__vbaFailedFriend
ord716
__vbaFPException
ord717
ord319
__vbaUbound
__vbaVarCat
ord537
ord644
ord645
_CIlog
__vbaFileOpen
__vbaInStr
__vbaNew2
ord648
_adj_fdiv_m32i
_adj_fdivr_m32i
__vbaStrCopy
ord681
__vbaFreeStrList
_adj_fdivr_m32
_adj_fdiv_r
ord685
ord100
__vbaI4Var
__vbaForEachAry
__vbaAryLock
ord320
__vbaVarDup
__vbaStrToAnsi
__vbaFreeVarg
ord321
__vbaAryVarVarg
ord616
__vbaFpI4
__vbaVarCopy
ord617
__vbaVarSetObjAddref
_CIatan
ord618
__vbaCastObj
__vbaStrMove
__vbaAryCopy
ord619
__vbaStrVarCopy
_allmul
_CItan
ord546
__vbaAryUnlock
_CIexp
__vbaFreeObj
__vbaFreeStr
Sections
.text Size: 64KB - Virtual size: 62KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 16KB - Virtual size: 24KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE