Static task
static1
Behavioral task
behavioral1
Sample
cc4db62a968f9f0a56830ac665023f0e5ba35a29c75be53f88dd377126e559aa.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
cc4db62a968f9f0a56830ac665023f0e5ba35a29c75be53f88dd377126e559aa.exe
Resource
win10v2004-20220901-en
General
-
Target
cc4db62a968f9f0a56830ac665023f0e5ba35a29c75be53f88dd377126e559aa
-
Size
112KB
-
MD5
51de45cbb1ae24d414d8e738e238f4d0
-
SHA1
e1c1272bf292a4db1a0a62bb11cb899981ffc9be
-
SHA256
cc4db62a968f9f0a56830ac665023f0e5ba35a29c75be53f88dd377126e559aa
-
SHA512
34de4743b3cb521801c8cffbfb3bf2cd5e5df7950d6b606e3a994a7ba230d6ab082d461f12a3f61dcc8a060427f33d471f7986566fa69d7204dc23e7255493a7
-
SSDEEP
3072:VtD+kYitjOVEIZHzaurKuVBoGhzgN78/mu/Lrg:siedaEVO73GM
Malware Config
Signatures
Files
-
cc4db62a968f9f0a56830ac665023f0e5ba35a29c75be53f88dd377126e559aa.exe windows x86
c8c7987d4e97c6e2210ef3bbc96783f8
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
ord698
MethCallEngine
ord669
ord702
ord598
ord709
EVENT_SINK_AddRef
DllFunctionCall
EVENT_SINK_Release
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord608
ProcCallEngine
ord644
ord537
ord538
ord648
ord680
ord100
Sections
.text Size: 88KB - Virtual size: 84KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 6KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 16KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ