Static task
static1
Behavioral task
behavioral1
Sample
601ffbef4f0ceb380de98dda2f9efb8bbdb27181e532836ab395fc83ea632ca1.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
601ffbef4f0ceb380de98dda2f9efb8bbdb27181e532836ab395fc83ea632ca1.exe
Resource
win10v2004-20220901-en
General
-
Target
601ffbef4f0ceb380de98dda2f9efb8bbdb27181e532836ab395fc83ea632ca1
-
Size
82KB
-
MD5
0abae74c7bbad71c155b2118e7ee4940
-
SHA1
2998d8351a09817dcdb75a27f5bd1be59cb1b84b
-
SHA256
601ffbef4f0ceb380de98dda2f9efb8bbdb27181e532836ab395fc83ea632ca1
-
SHA512
b719a8abe6e553284204de4047cc5c4b138ec35c932f1a780416fa7da51ceef413a466755b893c804aefb945e1ec7ebee9226d855ea7da4f0d7a6c044a2dd46e
-
SSDEEP
768:rqzsEaCY3vj0HMfUk2UIfFemsMTjeM0cAfvqAoLTXLYYxAghrzu+zZHHfYV0djWq:mA7C5kUpvMO/ToUWfrFWFrDGztrkEODZ
Malware Config
Signatures
Files
-
601ffbef4f0ceb380de98dda2f9efb8bbdb27181e532836ab395fc83ea632ca1.exe windows x86
f285514c6d4f1763691b2b5fc8a39a2c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SetWindowsHookExA
UnhookWindowsHookEx
kernel32
GetProcAddress
RtlMoveMemory
GlobalFree
GetModuleHandleA
GlobalAlloc
msvbvm60
EVENT_SINK_GetIDsOfNames
ord694
MethCallEngine
EVENT_SINK_Invoke
ord516
ord518
ord666
Zombie_GetTypeInfo
EVENT_SINK2_Release
ord595
ord598
ord520
ord631
ord632
ord525
ord526
EVENT_SINK_AddRef
ord528
DllFunctionCall
Zombie_GetTypeInfoCount
EVENT_SINK_Release
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord711
ord712
ord607
ord608
ord609
ord531
ord716
ord319
ProcCallEngine
ord537
ord644
ord645
ord570
ord648
EVENT_SINK2_AddRef
ord681
ord578
ord100
ord610
ord611
ord320
ord612
ord321
ord616
ord617
ord619
ord580
ord581
Sections
.text Size: 72KB - Virtual size: 70KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ