Static task
static1
Behavioral task
behavioral1
Sample
e62f67c05492a1ee57a02ee1536b7abca89b5eb1099aadbd89199cb464fa3240.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e62f67c05492a1ee57a02ee1536b7abca89b5eb1099aadbd89199cb464fa3240.exe
Resource
win10v2004-20220901-en
General
-
Target
e62f67c05492a1ee57a02ee1536b7abca89b5eb1099aadbd89199cb464fa3240
-
Size
35KB
-
MD5
6c4204989ec12e4b5dc11b9ea9a74490
-
SHA1
168a9a31acc82fbdb834aed5eb5146bafab4ce06
-
SHA256
e62f67c05492a1ee57a02ee1536b7abca89b5eb1099aadbd89199cb464fa3240
-
SHA512
3c788c3e144639bada5be942d40365af11264f4eae2b7c04c252ad08b1a7b9f0317a1dfd79d8cf754cadab61e51254ba63a351bddb32539fa09cc8403adcefde
-
SSDEEP
768:SJeatmuyCx33yb9abcrL7ibyyl2I7FatW8S4:SJ3t9yCZK9abeKyyA
Malware Config
Signatures
Files
-
e62f67c05492a1ee57a02ee1536b7abca89b5eb1099aadbd89199cb464fa3240.exe windows x86
6a6a4431a5c9b9947966273bd6bc1866
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
winmm
mixerOpen
kernel32
DebugActiveProcess
user32
GetMessageExtraInfo
msvbvm60
ord183
MethCallEngine
ord513
ord515
EVENT_SINK_AddRef
DllFunctionCall
ord563
ord670
EVENT_SINK_Release
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord717
ProcCallEngine
ord537
ord644
ord570
ord100
ord432
Sections
.text Size: 31KB - Virtual size: 31KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ