Static task
static1
Behavioral task
behavioral1
Sample
5860accd6691781ea29e1a972b46721ce1af5037cca20965a3d7bb5499001b07.exe
Resource
win7-20220812-en
General
-
Target
5860accd6691781ea29e1a972b46721ce1af5037cca20965a3d7bb5499001b07
-
Size
296KB
-
MD5
77433c99f864d01d85195526bf10b430
-
SHA1
c67c690ba7225c780c33fc7970078a72ee6881a2
-
SHA256
5860accd6691781ea29e1a972b46721ce1af5037cca20965a3d7bb5499001b07
-
SHA512
09e162d137d6d6936bfdd23aa53faf5d336be0a8680b8a48ed67649d8a17fee2cbcad762c5f803281c71609bf060b6f94348edd3eeb3c69d239fc04e16ae82be
-
SSDEEP
6144:QWjZ0xCVh605Ydn7euMaLMKUJdEeWpeoV5Y:QW1oCVI57MOwd2eD
Malware Config
Signatures
Files
-
5860accd6691781ea29e1a972b46721ce1af5037cca20965a3d7bb5499001b07.exe windows x86
fc39d6bcccc6aed12cc7b3f6f5003c3e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
MethCallEngine
ord516
ord632
EVENT_SINK_AddRef
DllFunctionCall
EVENT_SINK_Release
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord608
ProcCallEngine
ord644
ord100
ord617
ord581
Sections
.text Size: 56KB - Virtual size: 54KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 216KB - Virtual size: 216KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE