Static task
static1
Behavioral task
behavioral1
Sample
be4deb60c986c3ebb519cfdaecc89bcc24da6bddb512b1b71cb3c17b0ba8e947.exe
Resource
win7-20220812-en
General
-
Target
be4deb60c986c3ebb519cfdaecc89bcc24da6bddb512b1b71cb3c17b0ba8e947
-
Size
1.6MB
-
MD5
65d818739b9b1c59978d35cb3d81d906
-
SHA1
e59b9fce6df99798417a9f85700962e51c926d27
-
SHA256
be4deb60c986c3ebb519cfdaecc89bcc24da6bddb512b1b71cb3c17b0ba8e947
-
SHA512
395040b1b2ae61eddf8a99556c907972f877c7566f52de2325b753c4cc948301653e4843c55071bae3c44ca351b89a7b9af2f7f028c260c6c3b14b17530647ed
-
SSDEEP
24576:/hsCRDHDx3khKvvKJw5dP0mmelDQxUr4XM1NAupiOOzLwjDxnnHO4NVx0b/Xfz:9RjdfNH0GTr4c19mnwlHO4oX
Malware Config
Signatures
Files
-
be4deb60c986c3ebb519cfdaecc89bcc24da6bddb512b1b71cb3c17b0ba8e947.exe windows x86
b5bfdb4c23b9e9d3ee09fb46749ee711
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
MethCallEngine
ord516
ord598
ord631
ord632
ord526
EVENT_SINK_AddRef
DllFunctionCall
EVENT_SINK_Release
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord712
ord713
ord607
ord716
ord717
ProcCallEngine
ord537
ord644
ord573
ord100
ord616
ord619
Sections
.text Size: 16KB - Virtual size: 13KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 8KB - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
���� Size: - Virtual size: 1B
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE