Static task
static1
Behavioral task
behavioral1
Sample
51619e20ed60153054942a7c849c64e14c3afb13d03677776ab9196a995fda6c.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
51619e20ed60153054942a7c849c64e14c3afb13d03677776ab9196a995fda6c.exe
Resource
win10v2004-20220812-en
General
-
Target
51619e20ed60153054942a7c849c64e14c3afb13d03677776ab9196a995fda6c
-
Size
68KB
-
MD5
a0a6608540fab628a58e4fbd5bd8fb60
-
SHA1
6d5f98cb66ba381634ee38e004093123b2c15c1d
-
SHA256
51619e20ed60153054942a7c849c64e14c3afb13d03677776ab9196a995fda6c
-
SHA512
9bcb904b5fcdbf2d6f9c47b7685a388a9f9b10d6568a75fc9c2685ff4080c05cfcffee0e712d901c86867df65b46f9bc31f6017a5ee4968b4489cd1373ab0504
-
SSDEEP
1536:LU0nL0QAFuFDmLpnMT2CBrnTndnXnxC1XWXBXAX+C:HLaY9apMBBJ
Malware Config
Signatures
Files
-
51619e20ed60153054942a7c849c64e14c3afb13d03677776ab9196a995fda6c.exe windows x86
33d52c7e02cf046a3f7d1c138fb31b45
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
ord183
ord187
ord696
ord697
ord698
MethCallEngine
ord519
ord595
ord598
ord631
ord709
ord524
ord632
ord526
EVENT_SINK_AddRef
ord527
ord529
ord560
DllFunctionCall
EVENT_SINK_Release
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord711
ord712
ord607
ord608
ord717
ProcCallEngine
ord537
ord644
ord645
ord538
ord647
ord648
ord570
ord571
ord572
ord578
ord685
ord100
ord616
ord618
ord619
ord652
Sections
.text Size: 60KB - Virtual size: 59KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 10KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ