Static task
static1
Behavioral task
behavioral1
Sample
0d366e5984403e81781ba2cd9457d24d812b805ca26068fff762641acfac14db.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0d366e5984403e81781ba2cd9457d24d812b805ca26068fff762641acfac14db.exe
Resource
win10v2004-20220812-en
General
-
Target
0d366e5984403e81781ba2cd9457d24d812b805ca26068fff762641acfac14db
-
Size
148KB
-
MD5
060a87896dac71c033f998b5ba4e01d5
-
SHA1
05e8694c13746fc375575225c92c5814ed887c74
-
SHA256
0d366e5984403e81781ba2cd9457d24d812b805ca26068fff762641acfac14db
-
SHA512
ca1e8e6a5ae5be094e3cb04448533f57948778fba5a89950b72377bd5b419946bc39482c47d864f3f9cf16814f58157550a137206cb464f5ef12157f8fa417d4
-
SSDEEP
3072:H9EUP0Fx0k4MWJjFalEadPFO0c6p866zn/4R1kc:g1
Malware Config
Signatures
Files
-
0d366e5984403e81781ba2cd9457d24d812b805ca26068fff762641acfac14db.exe windows x86
22896e36b09e10b4ceb2ce1dbd8c48bb
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
ord696
MethCallEngine
ord516
ord628
ord665
ord632
EVENT_SINK_AddRef
DllFunctionCall
EVENT_SINK_Release
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord608
ord717
ProcCallEngine
ord644
ord681
ord100
Sections
.text Size: 140KB - Virtual size: 136KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ