Static task
static1
Behavioral task
behavioral1
Sample
ac14102304ae4ed30a560b4172866ab988f7049c4a40bac4a4a02432e4828967.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
ac14102304ae4ed30a560b4172866ab988f7049c4a40bac4a4a02432e4828967.exe
Resource
win10v2004-20220812-en
General
-
Target
ac14102304ae4ed30a560b4172866ab988f7049c4a40bac4a4a02432e4828967
-
Size
68KB
-
MD5
60604d5ff2ae6145dab03364e0b8e873
-
SHA1
96bfff967a46777059d31452e704bc18aee1cedc
-
SHA256
ac14102304ae4ed30a560b4172866ab988f7049c4a40bac4a4a02432e4828967
-
SHA512
d7911e268d83c5ea61421ad769e763d337c829049108a833f096a064d0cdc66e9b7da2e9a2e15535730dcbb5039af86fcb303fb94c671f28218bd3ff51e6839f
-
SSDEEP
768:JcdliTdG+bAl+qOQSgFrhKo//WomvdfQXwYt1IEDIefZsK:2dIx3AcqOK3qowgnt1d
Malware Config
Signatures
Files
-
ac14102304ae4ed30a560b4172866ab988f7049c4a40bac4a4a02432e4828967.exe windows x86
c7005d5e374c770dd6e3b206fd4b8803
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
IMAGE_FILE_DEBUG_STRIPPED
Imports
msvbvm60
MethCallEngine
ord517
ord518
ord593
ord594
ord598
ord631
ord632
ord526
EVENT_SINK_AddRef
ord528
ord529
DllFunctionCall
EVENT_SINK_Release
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord711
ord712
ord606
ord607
ord608
ord716
ord717
ProcCallEngine
ord537
ord644
ord570
ord648
ord573
ord100
ord616
ord618
ord546
ord547
ord580
Sections
.text Size: 67KB - Virtual size: 66KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 512B - Virtual size: 308B
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ