Static task
static1
Behavioral task
behavioral1
Sample
d9c5055aade4f2800925bc6170c9470ec90132a02e2666070ba30a071fc514da.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d9c5055aade4f2800925bc6170c9470ec90132a02e2666070ba30a071fc514da.exe
Resource
win10v2004-20220901-en
General
-
Target
d9c5055aade4f2800925bc6170c9470ec90132a02e2666070ba30a071fc514da
-
Size
30KB
-
MD5
90619b079c244a332f2c0cf65d6c92b0
-
SHA1
459a7d7c126b6b3cc8cd76261a4a40efc431f329
-
SHA256
d9c5055aade4f2800925bc6170c9470ec90132a02e2666070ba30a071fc514da
-
SHA512
673120057009deea390fe76acef288ec55b0443e5c08dae8b0a6c5b43f8645cb0b6ca58323dbbc280ba1b50db6f015201f7d7d4618f1757fc6ea39d922106b63
-
SSDEEP
768:UY/DsMCVr1eaoUm/uCDVhiQkxJze+z/c:UYY3hzv6krzJzk
Malware Config
Signatures
Files
-
d9c5055aade4f2800925bc6170c9470ec90132a02e2666070ba30a071fc514da.exe windows x86
b0ff65766a30bb1bc795304a809657a9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
ord183
ord588
ord696
ord589
ord697
ord698
MethCallEngine
ord598
ord520
ord631
ord709
ord524
ord632
ord526
EVENT_SINK_AddRef
ord528
DllFunctionCall
EVENT_SINK_Release
ord601
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord712
ord607
ord608
ord717
ProcCallEngine
ord537
ord644
ord647
ord570
ord573
ord681
ord100
ord616
ord617
ord543
ord652
Sections
.text Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 504B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ