Behavioral task
behavioral1
Sample
079306b560d9188c4f4613506f3c582ac6a408892388884958e4db96df3e906d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
079306b560d9188c4f4613506f3c582ac6a408892388884958e4db96df3e906d.exe
Resource
win10v2004-20220812-en
General
-
Target
079306b560d9188c4f4613506f3c582ac6a408892388884958e4db96df3e906d
-
Size
590KB
-
MD5
602a9696edbff8434151ec7246d7e383
-
SHA1
001d8b9b737bb3a979567f38321d097431234061
-
SHA256
079306b560d9188c4f4613506f3c582ac6a408892388884958e4db96df3e906d
-
SHA512
558db17494318d92114715559ea4b014ceec4e84d16a8fd700c2ef8be441dd6230e5ae050d0f0fa9f45eafef679d96bc91c5be1937658dbc23c31ceface4bd10
-
SSDEEP
6144:uZfec9EbXDk6RkQK7rG1VVE+IwrG1VVE+IwrG1VVE+IRuHOyrG1VVE+IwrG1VVEh:uZWtI6RkRununu9OWununuoBZM
Malware Config
Signatures
-
resource yara_rule sample upx
Files
-
079306b560d9188c4f4613506f3c582ac6a408892388884958e4db96df3e906d.exe windows x86
050bf34c6cef5c7a5956f987ecfe55d4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
__vbaVarTstGt
__vbaVarSub
__vbaStrI2
_CIcos
_adj_fptan
__vbaVarMove
__vbaVarVargNofree
__vbaAryMove
__vbaFreeVar
__vbaLenBstr
__vbaStrVarMove
__vbaPut3
__vbaEnd
__vbaFreeVarList
_adj_fdiv_m64
__vbaStrErrVarCopy
_adj_fprem1
__vbaRecAnsiToUni
__vbaStrCat
__vbaVarCmpNe
__vbaLsetFixstr
__vbaRecDestruct
__vbaSetSystemError
__vbaNameFile
__vbaHresultCheckObj
__vbaLenVar
_adj_fdiv_m32
__vbaAryDestruct
__vbaVarIndexLoadRefLock
__vbaVarForInit
__vbaExitProc
__vbaObjSet
__vbaOnError
_adj_fdiv_m16i
__vbaObjSetAddref
_adj_fdivr_m16i
__vbaVarIndexLoad
__vbaStrFixstr
__vbaFpR8
__vbaRefVarAry
__vbaBoolVarNull
_CIsin
__vbaChkstk
__vbaFileClose
EVENT_SINK_AddRef
__vbaGenerateBoundsError
__vbaGet3
__vbaStrCmp
__vbaVarTstEq
__vbaAryConstruct2
__vbaPutOwner3
__vbaI2I4
DllFunctionCall
__vbaVarOr
__vbaRedimPreserve
_adj_fpatan
__vbaRedim
__vbaRecUniToAnsi
EVENT_SINK_Release
_CIsqrt
__vbaVarAnd
EVENT_SINK_QueryInterface
__vbaVarMul
__vbaExceptHandler
__vbaInputFile
__vbaStrToUnicode
__vbaPrintFile
_adj_fprem
_adj_fdivr_m64
__vbaFPException
__vbaInStrVar
__vbaStrVarVal
__vbaUbound
__vbaGetOwner3
__vbaGetOwner4
__vbaVarCat
__vbaI2Var
__vbaFileSeek
_CIlog
__vbaErrorOverflow
__vbaFileOpen
__vbaVar2Vec
__vbaInStr
__vbaNew2
_adj_fdiv_m32i
_adj_fdivr_m32i
__vbaStrCopy
__vbaFreeStrList
_adj_fdivr_m32
_adj_fdiv_r
__vbaVarTstNe
__vbaI4Var
__vbaVarCmpEq
__vbaAryLock
__vbaVarAdd
__vbaStrToAnsi
__vbaVarDup
__vbaVarMod
__vbaVarCopy
__vbaR8IntI2
_CIatan
__vbaUI1Str
__vbaStrMove
__vbaStrVarCopy
_allmul
_CItan
__vbaUI1Var
__vbaAryUnlock
__vbaVarForNext
_CIexp
__vbaFreeObj
__vbaFreeStr
Sections
UPX0 Size: 212KB - Virtual size: 212KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 30KB - Virtual size: 32KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.avc Size: 3KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE