Static task
static1
Behavioral task
behavioral1
Sample
16fdd78ee24b8841789e793db00d629ee10099b6e17a0059e485aab286e97dc8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
16fdd78ee24b8841789e793db00d629ee10099b6e17a0059e485aab286e97dc8.exe
Resource
win10v2004-20220812-en
General
-
Target
16fdd78ee24b8841789e793db00d629ee10099b6e17a0059e485aab286e97dc8
-
Size
184KB
-
MD5
81151a7d39f14c7fa92fc1ddf3aa1960
-
SHA1
3411962d14f1fa46bddafb9553052f7f3969c195
-
SHA256
16fdd78ee24b8841789e793db00d629ee10099b6e17a0059e485aab286e97dc8
-
SHA512
eef18adaf5b8d873e5a411b3ccead7eb1346d3a135137695cb4bd64f89e6d1b72f83ca6f08113ee3caa5def3c34b0534b73ee955b8a8dd6e6d6b74784fac161f
-
SSDEEP
3072:uWT0dZgwNOQQYwDDBDZTsU5U/kWLi/icx:uospJoHPa/k
Malware Config
Signatures
Files
-
16fdd78ee24b8841789e793db00d629ee10099b6e17a0059e485aab286e97dc8.exe windows x86
0d33ed96ab8adfb3d358d7e6b26fc1a2
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
MethCallEngine
ord516
ord519
ord626
__vbaCopyBytes
ord666
ord667
ord593
ord594
ord595
ord598
ord520
ord631
ord525
ord526
EVENT_SINK_AddRef
ord528
ord529
DllFunctionCall
EVENT_SINK_Release
ord600
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord711
ord712
ord607
ord608
ord717
ProcCallEngine
ord535
ord537
ord644
ord645
ord648
ord570
ord572
ord685
ord578
ord100
ord616
ord617
ord580
ord581
Sections
.text Size: 40KB - Virtual size: 37KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.jk3 Size: 136KB - Virtual size: 136KB
IMAGE_SCN_MEM_WRITE