Static task
static1
Behavioral task
behavioral1
Sample
b3a38ac4b984a184b2cea4541d6ccf4531333f31b23920a050d3a0f8504f35dd.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b3a38ac4b984a184b2cea4541d6ccf4531333f31b23920a050d3a0f8504f35dd.exe
Resource
win10v2004-20220812-en
General
-
Target
b3a38ac4b984a184b2cea4541d6ccf4531333f31b23920a050d3a0f8504f35dd
-
Size
2.1MB
-
MD5
2a727c77a17be0c6991ab2b3a52de00c
-
SHA1
590fdbfe0015ab05cfc636b1b750ee4629457c76
-
SHA256
b3a38ac4b984a184b2cea4541d6ccf4531333f31b23920a050d3a0f8504f35dd
-
SHA512
ea3bf3a9a45bd78937af1b70ce5e1bd136ff5a9f462cffef37303b8ca032767b1367b4a8fa8502f8afeebd95034878eb8caf90ab5b3da331cd5cc6381b814306
-
SSDEEP
49152:CVSjBpM1XIDXfp4wrTtXNfdo3wZI7lrj:CVSjBpM1XIDXfphrTtXmwZI7lrj
Malware Config
Signatures
Files
-
b3a38ac4b984a184b2cea4541d6ccf4531333f31b23920a050d3a0f8504f35dd.exe windows x86
ebcb460a269845f8a6e26f5d269240ab
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
__vbaR8FixI4
__vbaVarTstGt
ord582
__vbaVarSub
__vbaStrI2
ord583
_CIcos
_adj_fptan
__vbaStrI4
ord585
__vbaVarMove
__vbaVarVargNofree
__vbaAryMove
__vbaFreeVar
__vbaLateIdCall
__vbaLenBstr
__vbaLineInputStr
__vbaStrVarMove
ord696
__vbaEnd
__vbaFreeVarList
_adj_fdiv_m64
ord698
__vbaFpCDblR8
__vbaVarIndexStore
__vbaLineInputVar
__vbaFreeObjList
__vbaR8Sgn
ord516
__vbaVarFix
_adj_fprem1
__vbaRecAnsiToUni
__vbaI2Abs
__vbaVarCmpNe
__vbaStrCat
__vbaForEachCollAd
__vbaBoolErrVar
__vbaLsetFixstr
ord660
__vbaSetSystemError
ord662
__vbaHresultCheckObj
ord556
__vbaLenVar
__vbaVargVarCopy
_adj_fdiv_m32
__vbaVarTstLe
__vbaAryVar
__vbaAryDestruct
__vbaVarIndexLoadRefLock
__vbaCyErrVar
__vbaVarPow
__vbaVarForInit
__vbaStrBool
ord593
__vbaBoolStr
__vbaExitProc
__vbaCyAdd
ord595
__vbaObjSet
__vbaOnError
_adj_fdiv_m16i
__vbaObjSetAddref
_adj_fdivr_m16i
ord598
__vbaVarIndexLoad
__vbaCyStr
__vbaStrFixstr
ord520
__vbaVarTstLt
__vbaFpR8
__vbaBoolVarNull
__vbaRefVarAry
_CIsin
__vbaErase
__vbaVargVarMove
ord632
__vbaVarCmpGt
__vbaChkstk
__vbaFileClose
ord526
EVENT_SINK_AddRef
ord528
__vbaGenerateBoundsError
ord529
__vbaStrCmp
__vbaExitEachColl
__vbaAryConstruct2
__vbaVarTstEq
__vbaR4Str
ord560
ord561
__vbaPrintObj
__vbaI2I4
__vbaObjVar
DllFunctionCall
ord563
__vbaVarLateMemSt
__vbaVarOr
__vbaCySub
__vbaCastObjVar
__vbaStrR4
__vbaRedimPreserve
__vbaLbound
_adj_fpatan
__vbaR4Var
__vbaLateIdCallLd
__vbaRedim
__vbaStrR8
__vbaR8Cy
__vbaUI1ErrVar
__vbaRecUniToAnsi
EVENT_SINK_Release
__vbaUI1I2
_CIsqrt
__vbaVarAnd
__vbaLateIdCallSt
EVENT_SINK_QueryInterface
__vbaUI1I4
__vbaFpCmpCy
__vbaVarMul
__vbaExceptHandler
ord711
ord712
__vbaPrintFile
__vbaStrToUnicode
_adj_fprem
_adj_fdivr_m64
ord607
__vbaR8ErrVar
__vbaVarDiv
__vbaI2Str
ord608
ord716
__vbaFPException
ord717
__vbaInStrVar
__vbaStrVarVal
__vbaUbound
__vbaR4ForNextCheck
__vbaVarCat
__vbaI2Var
__vbaLsetFixstrFree
ord537
ord645
_CIlog
__vbaErrorOverflow
__vbaFileOpen
__vbaVar2Vec
__vbaR8Str
ord648
__vbaInStr
__vbaNew2
ord571
__vbaVarInt
_adj_fdiv_m32i
_adj_fdivr_m32i
ord573
__vbaVarSetObj
__vbaStrCopy
ord681
__vbaI4Str
__vbaFreeStrList
ord576
_adj_fdivr_m32
__vbaPowerR8
__vbaR8Var
_adj_fdiv_r
ord685
ord100
__vbaVarTstNe
__vbaVarSetVar
__vbaI4Var
__vbaVarCmpEq
ord610
__vbaFpCy
__vbaVarAdd
__vbaAryLock
ord612
__vbaStrToAnsi
__vbaVarDup
ord614
__vbaFpI2
__vbaVarMod
__vbaVarTstGe
__vbaVarLateMemCallLd
__vbaFpI4
__vbaVarCopy
ord616
ord617
__vbaLateMemCallLd
_CIatan
__vbaI2ErrVar
__vbaUI1Str
__vbaAryCopy
__vbaStrMove
ord619
__vbaR8IntI4
__vbaStrVarCopy
_allmul
__vbaLateIdSt
_CItan
__vbaNextEachCollAd
__vbaUI1Var
ord547
__vbaAryUnlock
__vbaVarForNext
__vbaFpCSngR8
_CIexp
__vbaMidStmtBstr
__vbaStrCy
ord580
__vbaI4ErrVar
__vbaFreeObj
__vbaFreeStr
ord581
Sections
.text Size: 2.0MB - Virtual size: 2.0MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 20KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 28KB - Virtual size: 25KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ