Static task
static1
Behavioral task
behavioral1
Sample
371a307dbf153ab66b444351eea830b521519069ebd62a90959203c1561454e0.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
371a307dbf153ab66b444351eea830b521519069ebd62a90959203c1561454e0.exe
Resource
win10v2004-20220812-en
General
-
Target
371a307dbf153ab66b444351eea830b521519069ebd62a90959203c1561454e0
-
Size
308KB
-
MD5
783706f6404712271f6b40a4d9c9d390
-
SHA1
03ef8dec9aaa6eec670b91288083e67448bb4f0c
-
SHA256
371a307dbf153ab66b444351eea830b521519069ebd62a90959203c1561454e0
-
SHA512
c3eed60f158213ad0cb19cc1a63870443afd2c4b23797103bea3bf461b915c17a7b712f829c9c726a0bd458f1c55c6eceb46f3fd8451d4aba26275d4178e1d62
-
SSDEEP
6144:tMZPmbRzAV17LVPYS3K3GKd+cRo7+XyMd:tXQdaS3wXym
Malware Config
Signatures
Files
-
371a307dbf153ab66b444351eea830b521519069ebd62a90959203c1561454e0.exe windows x86
8ae73195c5d72e9b35bd4b04976e5b19
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
ord187
ord588
MethCallEngine
ord620
ord516
ord517
ord518
ord519
ord591
ord669
ord598
ord709
ord631
ord632
EVENT_SINK_AddRef
ord527
ord528
ord561
DllFunctionCall
ord564
EVENT_SINK_Release
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord711
ord712
ord606
ord607
ord608
ord531
ord717
ProcCallEngine
ord535
ord537
ord644
ord645
ord570
ord571
ord681
ord685
ord578
ord100
ord579
ord610
ord616
ord617
ord618
ord619
Sections
.text Size: 284KB - Virtual size: 281KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 11KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 48KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
trsympt Size: - Virtual size: 4KB
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE