Static task
static1
Behavioral task
behavioral1
Sample
0a889fb2ce7cf6d0b40d1535ccc06460230a99c889b5654c6338c06c4eab668f.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0a889fb2ce7cf6d0b40d1535ccc06460230a99c889b5654c6338c06c4eab668f.exe
Resource
win10v2004-20220901-en
General
-
Target
7995586173.zip
-
Size
130KB
-
MD5
8adaa4fc61d7e95cc97cd43eb025351b
-
SHA1
90a2b6d5b262d2a1e05641a9dfe30591165701ff
-
SHA256
8cf6e78751e142bfd1f02aa654d08366493f7e0a025c4488dc4da180e6402496
-
SHA512
816c3f06465968af6e83cc8af9a724d8dd2fc752d8ea01af9afe136b6cbcbd6dc6665e62cef6ebeff372c9d94e947e8d96544f9971fc3335892c6e5291799a59
-
SSDEEP
3072:XfVtpY4qEH/FNwamuAgZJz6dOJTaLT6ppXEX7aHemypsST+:vzpY4RpJz6eWCpXmaapHT+
Malware Config
Signatures
Files
-
7995586173.zip.zip
Password: infected
-
0a889fb2ce7cf6d0b40d1535ccc06460230a99c889b5654c6338c06c4eab668f.exe windows x86
7e787b380a32a5b864170b84df443441
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
__vbaVarSub
__vbaNextEachAry
_CIcos
_adj_fptan
__vbaVarMove
__vbaVarVargNofree
__vbaFreeVar
__vbaStrVarMove
__vbaLenBstr
__vbaFreeVarList
_adj_fdiv_m64
__vbaNextEachVar
__vbaFreeObjList
ord516
_adj_fprem1
__vbaStrCat
__vbaSetSystemError
__vbaHresultCheckObj
__vbaLenVar
_adj_fdiv_m32
__vbaAryVar
__vbaAryDestruct
__vbaOnError
__vbaObjSet
_adj_fdiv_m16i
_adj_fdivr_m16i
_CIsin
__vbaErase
ord631
__vbaVarZero
ord632
__vbaChkstk
__vbaFileClose
EVENT_SINK_AddRef
__vbaGenerateBoundsError
__vbaGet3
__vbaI2I4
DllFunctionCall
_adj_fpatan
__vbaRedim
EVENT_SINK_Release
ord601
__vbaUI1I2
_CIsqrt
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord711
ord606
_adj_fprem
_adj_fdivr_m64
__vbaI2Str
ord607
ord608
__vbaFPException
ord717
__vbaStrVarVal
__vbaVarCat
ord644
ord537
_CIlog
__vbaErrorOverflow
__vbaFileOpen
__vbaNew2
__vbaVar2Vec
_adj_fdiv_m32i
_adj_fdivr_m32i
ord573
__vbaStrCopy
__vbaFreeStrList
__vbaDerefAry1
_adj_fdivr_m32
_adj_fdiv_r
ord578
ord685
ord100
__vbaVarTstNe
__vbaI4Var
__vbaForEachAry
__vbaAryLock
__vbaVarDup
__vbaFpI4
__vbaVarCopy
_CIatan
__vbaStrMove
__vbaAryCopy
__vbaForEachVar
ord619
_allmul
_CItan
__vbaUI1Var
__vbaAryUnlock
_CIexp
__vbaMidStmtBstr
__vbaI4ErrVar
__vbaFreeObj
__vbaFreeStr
Sections
.text Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 128KB - Virtual size: 196KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE