Static task
static1
Behavioral task
behavioral1
Sample
b0486551ed71f591407313fc351c8b51c4277a289333e2c6516f416256145ced.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
b0486551ed71f591407313fc351c8b51c4277a289333e2c6516f416256145ced.exe
Resource
win10v2004-20220812-en
General
-
Target
b0486551ed71f591407313fc351c8b51c4277a289333e2c6516f416256145ced
-
Size
68KB
-
MD5
841961539de722f63352be288758a4c5
-
SHA1
59242b22523cb9bc1545c74c892312cea50b4a94
-
SHA256
b0486551ed71f591407313fc351c8b51c4277a289333e2c6516f416256145ced
-
SHA512
e0d67b90e8cc64049290aec0350a5be8f648e62cda2ef9bd6f125bda4f89a1e66244c880c2b8248574a36e6941c3c1ce6d6b828dcfaeaf0be9ddebf74afcfbd9
-
SSDEEP
768:4QqkbXMydzccPHwHkeWJ4Dyb2BShGxrd9Dn3HFK3GGOOCo:4TkAyNXHwE4BBbrl0NO1
Malware Config
Signatures
Files
-
b0486551ed71f591407313fc351c8b51c4277a289333e2c6516f416256145ced.exe windows x86
d606caa32e5e982ebdc8c207acdb1297
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
ord690
ord187
ord588
ord698
MethCallEngine
ord516
ord669
ord592
ord593
ord594
ord595
ord702
ord598
ord306
ord307
ord631
ord709
ord632
EVENT_SINK_AddRef
ord527
ord529
ord562
DllFunctionCall
EVENT_SINK_Release
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord711
ord607
ord608
ord717
ord318
ProcCallEngine
ord535
ord536
ord537
ord644
ord645
ord100
ord689
ord610
ord612
ord613
ord616
ord617
ord581
Sections
.text Size: 60KB - Virtual size: 57KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 9KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ