Static task
static1
Behavioral task
behavioral1
Sample
75e3afbf2fe96fc81758fe5613372d33d12442ee7d7e043f9ff36fadf0b0c465.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
75e3afbf2fe96fc81758fe5613372d33d12442ee7d7e043f9ff36fadf0b0c465.exe
Resource
win10v2004-20220901-en
General
-
Target
75e3afbf2fe96fc81758fe5613372d33d12442ee7d7e043f9ff36fadf0b0c465
-
Size
276KB
-
MD5
6c4b8330d729b5e704ec4d6c8355b810
-
SHA1
8f4b20c8b5ba60c210023d66ba06877a5180261e
-
SHA256
75e3afbf2fe96fc81758fe5613372d33d12442ee7d7e043f9ff36fadf0b0c465
-
SHA512
6d5fed135747dd846aa36db7243927cb9cac3fe5ffb4f99e3ddee13f736dff5bb850d68d3c30a7a27c99c331647ccae1a7a829ca83dd11b169331f7cf35b1be2
-
SSDEEP
6144:UN7AMLVJdhMtbAG8VmXU0CNe7npjHGY91h2:UFLVvhMtbAHmXIMRHGO/
Malware Config
Signatures
Files
-
75e3afbf2fe96fc81758fe5613372d33d12442ee7d7e043f9ff36fadf0b0c465.exe windows x86
942abe0283eea0388ae00a58e1108761
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
MethCallEngine
ord516
ord517
ord595
ord598
ord520
ord631
ord632
ord526
EVENT_SINK_AddRef
ord528
DllFunctionCall
EVENT_SINK_Release
ord600
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord711
ord608
ord716
ProcCallEngine
ord536
ord645
ord681
ord576
ord100
ord616
ord617
ord619
ord580
Sections
.text Size: 40KB - Virtual size: 40KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 132KB - Virtual size: 132KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
timlaol Size: 34KB - Virtual size: 34KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
xfanjgp Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
eemjzbx Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE