Static task
static1
Behavioral task
behavioral1
Sample
363f40c75c5b43b0b79bb5dc5677b88e12ca8e780caa4ccc0102b90eaf9827fd.exe
Resource
win7-20220901-en
General
-
Target
363f40c75c5b43b0b79bb5dc5677b88e12ca8e780caa4ccc0102b90eaf9827fd
-
Size
340KB
-
MD5
84d5eb78056c2ce6f0505c379156d4a6
-
SHA1
7924ceca5712fe8718a198d932f4c129b6b0a8f7
-
SHA256
363f40c75c5b43b0b79bb5dc5677b88e12ca8e780caa4ccc0102b90eaf9827fd
-
SHA512
6f3e8f3e6c0edb8e8bf48270da41edd33822928e2d12c486be412836843ca686116f54518785c2a2e0e03ab29010dd93218b71866d32852792116def544bfe29
-
SSDEEP
6144:tWjZ0xCVh6O3jhR7rpVcqQEzi0O2bo+ij9JmCG/zFCTfe:tW1oCVLNplYEzDlvij9mGe
Malware Config
Signatures
Files
-
363f40c75c5b43b0b79bb5dc5677b88e12ca8e780caa4ccc0102b90eaf9827fd.exe windows x86
fc39d6bcccc6aed12cc7b3f6f5003c3e
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
MethCallEngine
ord516
ord632
EVENT_SINK_AddRef
DllFunctionCall
EVENT_SINK_Release
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord608
ProcCallEngine
ord644
ord100
ord617
ord581
Sections
.text Size: 56KB - Virtual size: 54KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.data Size: - Virtual size: 50KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 116KB - Virtual size: 116KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
rolkxic Size: 32KB - Virtual size: 32KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
effkvxb Size: 56KB - Virtual size: 56KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
yrxcyod Size: 76KB - Virtual size: 76KB
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE