Static task
static1
Behavioral task
behavioral1
Sample
d6cb9ed944d4c0770bd29d1e2ffe6a05e5d1bb944e542b17dea742aa0e849050.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d6cb9ed944d4c0770bd29d1e2ffe6a05e5d1bb944e542b17dea742aa0e849050.exe
Resource
win10v2004-20220901-en
General
-
Target
d6cb9ed944d4c0770bd29d1e2ffe6a05e5d1bb944e542b17dea742aa0e849050
-
Size
30KB
-
MD5
a32f0e17b204cd148a2b36bb6d823a10
-
SHA1
b1a7505c12245714c01910918678b065bcf13c23
-
SHA256
d6cb9ed944d4c0770bd29d1e2ffe6a05e5d1bb944e542b17dea742aa0e849050
-
SHA512
f24967bb5ec9dba1e66c828a892bce0c4d629103441fbda5b6d69ac6524cd5c51367b21b15923a3a2bcc6f6046aff7381f7f3d919746aee30b6a0ee79ac8f8e5
-
SSDEEP
768:I1/msYtoKrtuUXD/uCaVhifk6JzvrVP/c:I1XYiKwYzkMzhPk
Malware Config
Signatures
Files
-
d6cb9ed944d4c0770bd29d1e2ffe6a05e5d1bb944e542b17dea742aa0e849050.exe windows x86
b0ff65766a30bb1bc795304a809657a9
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
ord183
ord588
ord696
ord589
ord697
ord698
MethCallEngine
ord598
ord520
ord631
ord709
ord524
ord632
ord526
EVENT_SINK_AddRef
ord528
DllFunctionCall
EVENT_SINK_Release
ord601
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord712
ord607
ord608
ord717
ProcCallEngine
ord537
ord644
ord647
ord570
ord573
ord681
ord100
ord616
ord617
ord543
ord652
Sections
.text Size: 23KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.rdata Size: 512B - Virtual size: 504B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 5KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ