Static task
static1
Behavioral task
behavioral1
Sample
0d500af72796b1c72448143a91739953be17240b1132c2053729e1799e9119cf.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
0d500af72796b1c72448143a91739953be17240b1132c2053729e1799e9119cf.exe
Resource
win10v2004-20220901-en
General
-
Target
0d500af72796b1c72448143a91739953be17240b1132c2053729e1799e9119cf
-
Size
250KB
-
MD5
396c9944a25035f5f9cbab3933358019
-
SHA1
9b570bbd02cb769984aea5e42ca83a83ee6a1399
-
SHA256
0d500af72796b1c72448143a91739953be17240b1132c2053729e1799e9119cf
-
SHA512
ab69a1fbe846cc1e2cd66c4e95fe904ecd76d1d7b3d95c728e36626d34d3abfabe42fb92a69049ec86b74d698d73c5a3685327c6cc12c1538c795961ce805cc1
-
SSDEEP
3072:c788E5EEEQiJAKMN9DAXamLKAcfbKyZwP02bVq3NZMf:cW5ycKMN9DtAcfbK/qT
Malware Config
Signatures
Files
-
0d500af72796b1c72448143a91739953be17240b1132c2053729e1799e9119cf.exe windows x86
ff219d25310f6794eabb4af70cf32125
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
ord690
ord187
ord588
MethCallEngine
ord516
ord517
ord518
ord519
ord300
ord595
ord702
ord598
ord599
ord704
ord520
ord306
ord307
ord522
ord631
ord709
ord525
ord632
EVENT_SINK_AddRef
ord527
DllFunctionCall
ord670
EVENT_SINK_Release
ord600
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord711
ord712
ord713
ord607
ord608
ord531
ord717
ord318
ProcCallEngine
ord535
ord644
ord537
ord645
ord648
ord680
ord681
ord685
ord578
ord100
ord579
ord689
ord616
ord617
ord618
ord619
ord580
ord581
Sections
.text Size: 196KB - Virtual size: 196KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: - Virtual size: 33KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 50KB - Virtual size: 78KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE