Static task
static1
Behavioral task
behavioral1
Sample
aa214cec64efbdd39e44b36bd96739fdf5bf98d5d7c1df371488b49b65e49e96.exe
Resource
win7-20220812-en
General
-
Target
aa214cec64efbdd39e44b36bd96739fdf5bf98d5d7c1df371488b49b65e49e96
-
Size
353KB
-
MD5
087ec2009c92e8627586d96d0079624e
-
SHA1
988888208e003af9f849601bec56c25ddb890f06
-
SHA256
aa214cec64efbdd39e44b36bd96739fdf5bf98d5d7c1df371488b49b65e49e96
-
SHA512
eb3a2fd2e2bd8c9f3f919322816dbdb88d5c637dc5d0a10a7e72740f2f6eb742048ad57577ebd53d7538abd154dc9591fe611999822310f34821a68f386f3575
-
SSDEEP
6144:5fVkdFQD3YymAGKgAz3nCLrGtD5ig0YcQ09hsDi/RvJ6e3sBsVZfQIf+G2:5Wdcmsgk3nCk9Vxc39aDyRYysBsR2
Malware Config
Signatures
Files
-
aa214cec64efbdd39e44b36bd96739fdf5bf98d5d7c1df371488b49b65e49e96.exe windows x86
904380d04c5c1db776f0a9713f8e22fc
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
MethCallEngine
ord516
ord598
ord631
ord632
ord526
EVENT_SINK_AddRef
ord561
DllFunctionCall
EVENT_SINK_Release
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord711
ord713
ord607
ord608
ord717
ProcCallEngine
ord537
ord644
ord570
ord573
ord681
ord685
ord100
ord618
ord581
Sections
pec1 Size: 36KB - Virtual size: 36KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
pec2 Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.adata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.udata Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE