Static task
static1
Behavioral task
behavioral1
Sample
a8c9863139433050b31a9975cc792937e8fd491fc81f5e2ffbda1fcfa8ff1ed0.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
a8c9863139433050b31a9975cc792937e8fd491fc81f5e2ffbda1fcfa8ff1ed0.exe
Resource
win10v2004-20220812-en
General
-
Target
a8c9863139433050b31a9975cc792937e8fd491fc81f5e2ffbda1fcfa8ff1ed0
-
Size
52KB
-
MD5
a337add5d03abb4b341977811df97922
-
SHA1
1eccaa2b9bc28a485a29bd37e02030527c6b601f
-
SHA256
a8c9863139433050b31a9975cc792937e8fd491fc81f5e2ffbda1fcfa8ff1ed0
-
SHA512
cff4d8b35b27a52913fb67c86b8c18c08a27a31673cd4591826ee397c8dbf152fef230caa14746eac105310608d588b879a6af910306efeafe7b8539bf61cd52
-
SSDEEP
384:urOug8+btsECRkN46w83z/Ze68gCya4n9N+ORXtg6ml4Mm286tzUyUEXgjppXdSs:QfSql+w830NQn90WXtWahbdVsN
Malware Config
Signatures
Files
-
a8c9863139433050b31a9975cc792937e8fd491fc81f5e2ffbda1fcfa8ff1ed0.exe windows x86
40f2612d48f1871e380f1932316757e4
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
SetWindowsHookExA
GetWindowLongA
UnhookWindowsHookEx
SetWindowLongA
CallWindowProcA
kernel32
GetProcAddress
RtlMoveMemory
GlobalFree
GetModuleHandleA
GetVersionExA
GlobalAlloc
msvbvm60
EVENT_SINK_GetIDsOfNames
ord694
MethCallEngine
EVENT_SINK_Invoke
ord516
ord519
Zombie_GetTypeInfo
EVENT_SINK2_Release
ord593
ord594
ord598
ord631
ord632
ord525
ord526
EVENT_SINK_AddRef
ord528
ord529
DllFunctionCall
Zombie_GetTypeInfoCount
EVENT_SINK_Release
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord608
ord716
ord319
ProcCallEngine
ord537
ord644
ord570
ord648
EVENT_SINK2_AddRef
ord681
ord576
ord578
ord100
ord320
ord321
ord616
ord619
ord546
ord580
ord581
Sections
.text Size: 44KB - Virtual size: 41KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ