Static task
static1
Behavioral task
behavioral1
Sample
d442e01fcc18ce8c8d1d9e39c70217e9aeb024d55b047142c5ca66a00d175e0e.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d442e01fcc18ce8c8d1d9e39c70217e9aeb024d55b047142c5ca66a00d175e0e.exe
Resource
win10v2004-20220812-en
General
-
Target
d442e01fcc18ce8c8d1d9e39c70217e9aeb024d55b047142c5ca66a00d175e0e
-
Size
492KB
-
MD5
6e41ab5ea9f31b17179e41540cdd06a0
-
SHA1
89dba63a1391f1784597179c988591c4ab6dfe1b
-
SHA256
d442e01fcc18ce8c8d1d9e39c70217e9aeb024d55b047142c5ca66a00d175e0e
-
SHA512
d6acfaf34d58f9ff34678a5640ef54cd6ef24cc6bbe53051f9add28ce2c87cbe4a7089aac70ae257e9f3b08dbf997b02ad714c91c6e00fc4371d37db7b39eaee
-
SSDEEP
6144:1HjhZ/d7jLkLBfbANOT6HDtYiIG+MUSpK:1l78ENBxYiIXMPM
Malware Config
Signatures
Files
-
d442e01fcc18ce8c8d1d9e39c70217e9aeb024d55b047142c5ca66a00d175e0e.exe windows x86
944ffd2c407a25fa20a7810c79f21e25
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
EVENT_SINK_GetIDsOfNames
MethCallEngine
EVENT_SINK_Invoke
ord660
Zombie_GetTypeInfo
ord300
ord301
ord595
ord302
ord596
ord303
ord598
ord306
ord520
ord307
ord308
ord309
ord709
ord632
EVENT_SINK_AddRef
ord560
DllFunctionCall
Zombie_GetTypeInfoCount
EVENT_SINK_Release
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord711
ord712
ord606
ord607
ord608
ord717
ord319
ProcCallEngine
ord535
ord537
ord644
ord648
ord570
ord685
ord100
ord320
ord321
ord616
ord617
ord619
ord650
Sections
.text Size: 260KB - Virtual size: 258KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 13KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 228KB - Virtual size: 224KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ