Static task
static1
Behavioral task
behavioral1
Sample
20110bb0dc55ccc6c0a0b427aeb0940369e0e619e613c098d2cb0ee3f0cf41ce.exe
Resource
win7-20220812-en
General
-
Target
20110bb0dc55ccc6c0a0b427aeb0940369e0e619e613c098d2cb0ee3f0cf41ce
-
Size
328KB
-
MD5
4f2e904d3f9dadb4e4ea93176e50f383
-
SHA1
731b16c80552b3ad3581437aff758ba83dad104e
-
SHA256
20110bb0dc55ccc6c0a0b427aeb0940369e0e619e613c098d2cb0ee3f0cf41ce
-
SHA512
33391ff3a336694716e41c2a7a8765bf7c09e705b4cfe2b949db25f00cce5cbc10f3a468b137f88fead5d4d8749bcb15bd49dcab7eee37655a50ca63545479b4
-
SSDEEP
6144:XwI036q0/xD0N4B1QZxzk0mJ2oykZr4bFdQ3q9Th3GMK+:d036q0JD0yEZy0mJ1ykqFOw3V
Malware Config
Signatures
Files
-
20110bb0dc55ccc6c0a0b427aeb0940369e0e619e613c098d2cb0ee3f0cf41ce.exe windows x86
13ec1e7ab42445fa36a9f0de06bc409f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
pstorec
PStoreCreateInstance
msvbvm60
MethCallEngine
ord516
ord517
ord518
ord666
ord667
ord520
ord631
ord632
ord526
EVENT_SINK_AddRef
ord529
DllFunctionCall
EVENT_SINK_Release
ord601
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord711
ord712
ord607
ord608
ord717
ProcCallEngine
ord537
ord644
ord645
ord570
ord648
ord571
ord573
ord100
ord616
ord617
ord618
ord619
ord581
Sections
.text Size: 68KB - Virtual size: 65KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 256KB - Virtual size: 255KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ