Static task
static1
Behavioral task
behavioral1
Sample
30748e4b091ba618ac7d64e0a09bc82b0b547241058ffede0b52b9ff35dd5bc4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
30748e4b091ba618ac7d64e0a09bc82b0b547241058ffede0b52b9ff35dd5bc4.exe
Resource
win10v2004-20220812-en
General
-
Target
30748e4b091ba618ac7d64e0a09bc82b0b547241058ffede0b52b9ff35dd5bc4
-
Size
82KB
-
MD5
057352ff021af826ded28a3849c3f12e
-
SHA1
597585286386538af702044f2d884ef46c4067b6
-
SHA256
30748e4b091ba618ac7d64e0a09bc82b0b547241058ffede0b52b9ff35dd5bc4
-
SHA512
78344d9f44705efe55b70c8474844a20406dacd7d14906d2095437924fc4330c06c3d92c40d8f158aae7c1c47204fde3d1f7457344966b0fcaa54fef3c4df674
-
SSDEEP
1536:fWarsg7JzTdwbkO/TmivL9RqVMrDGztrjEObZ:uarsg7JzTdwbkO/Tmq9Br6Pt
Malware Config
Signatures
Files
-
30748e4b091ba618ac7d64e0a09bc82b0b547241058ffede0b52b9ff35dd5bc4.exe windows x86
f285514c6d4f1763691b2b5fc8a39a2c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SetWindowsHookExA
UnhookWindowsHookEx
kernel32
GetProcAddress
RtlMoveMemory
GlobalFree
GetModuleHandleA
GlobalAlloc
msvbvm60
EVENT_SINK_GetIDsOfNames
ord694
MethCallEngine
EVENT_SINK_Invoke
ord516
ord518
ord666
Zombie_GetTypeInfo
EVENT_SINK2_Release
ord595
ord598
ord520
ord631
ord632
ord525
ord526
EVENT_SINK_AddRef
ord528
DllFunctionCall
Zombie_GetTypeInfoCount
EVENT_SINK_Release
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord711
ord712
ord607
ord608
ord609
ord531
ord716
ord319
ProcCallEngine
ord537
ord644
ord645
ord570
ord648
EVENT_SINK2_AddRef
ord681
ord578
ord100
ord610
ord611
ord320
ord612
ord321
ord616
ord617
ord619
ord580
ord581
Sections
.text Size: 72KB - Virtual size: 71KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ