Static task
static1
Behavioral task
behavioral1
Sample
5404beece04dfe08c9610a673779e3c6533a225617132f3055e557da2fec3f06.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
5404beece04dfe08c9610a673779e3c6533a225617132f3055e557da2fec3f06.exe
Resource
win10v2004-20220901-en
General
-
Target
5404beece04dfe08c9610a673779e3c6533a225617132f3055e557da2fec3f06
-
Size
364KB
-
MD5
671d20fd7cddd8df98177e22ed000120
-
SHA1
eeab245e743990d463fc7b599e843f9ecd28b0db
-
SHA256
5404beece04dfe08c9610a673779e3c6533a225617132f3055e557da2fec3f06
-
SHA512
3867d003400d6ed0dc9f904f7b3490ebb506cec3c17fdbef83b1b515cb0e45d0aebcb97f1cb16f0bd3a578d17e95ace94b95e7f5d49bfada6231bd69f5fe75d2
-
SSDEEP
6144:Wbtio7ycQhHPzp0hYido+NQz+Hwveb+9a:WBblDhrdo+NQz+HwvD
Malware Config
Signatures
Files
-
5404beece04dfe08c9610a673779e3c6533a225617132f3055e557da2fec3f06.exe windows x86
bf64ef0775498675628a635373e3506a
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
ntdll
RtlMoveMemory
msvbvm60
MethCallEngine
ord516
ord631
EVENT_SINK_AddRef
ord527
DllFunctionCall
EVENT_SINK_Release
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord606
ord608
ProcCallEngine
ord644
ord100
ord616
ord581
Sections
.text Size: 164KB - Virtual size: 164KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: - Virtual size: 44KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 196KB - Virtual size: 196KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE