Static task
static1
Behavioral task
behavioral1
Sample
430b6b2e6417ea8accf94953b31406881a7a662cfd46597ed1376bf79ad67585.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
430b6b2e6417ea8accf94953b31406881a7a662cfd46597ed1376bf79ad67585.exe
Resource
win10v2004-20220812-en
General
-
Target
430b6b2e6417ea8accf94953b31406881a7a662cfd46597ed1376bf79ad67585
-
Size
256KB
-
MD5
0f22be01bd0f108223c96b154c43f7e0
-
SHA1
4bfeb5162d1cafa8afe2aeba7c30ba0f8736e21c
-
SHA256
430b6b2e6417ea8accf94953b31406881a7a662cfd46597ed1376bf79ad67585
-
SHA512
6694745bafb8ddfb0d9b8342dc42862e6a065de3bd61c3960a8801589c873484d2623592af367f7f159263610c9d3a7576af5ee15c487922bc3ca6a56232bf13
-
SSDEEP
3072:w0bfWRrIMNRlZ62Pal2LBJXmzOHm5WZ3K+MC2uOQ39cOaRr5ZfPNM:wWepp3PJXCOGY3emOQ39ce
Malware Config
Signatures
Files
-
430b6b2e6417ea8accf94953b31406881a7a662cfd46597ed1376bf79ad67585.exe windows x86
72a021ed2e19928d2d4aa90d96197e45
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
ord187
MethCallEngine
ord516
ord517
ord518
ord519
ord555
ord663
ord669
ord598
ord520
ord631
ord709
ord632
EVENT_SINK_AddRef
ord527
ord528
DllFunctionCall
EVENT_SINK_Release
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord711
ord712
ord606
ord607
ord608
ord717
ProcCallEngine
ord535
ord537
ord644
ord645
ord681
ord578
ord100
ord579
ord616
ord617
ord618
ord619
Sections
.text Size: 232KB - Virtual size: 230KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 7KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ