Static task
static1
Behavioral task
behavioral1
Sample
e4ddbf2da60db701827309514f0844a0984ffefe43674265bfcf82cbc95e295b.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e4ddbf2da60db701827309514f0844a0984ffefe43674265bfcf82cbc95e295b.exe
Resource
win10v2004-20220812-en
General
-
Target
e4ddbf2da60db701827309514f0844a0984ffefe43674265bfcf82cbc95e295b
-
Size
220KB
-
MD5
0e0d161ddb4d927f75a1f021704c610b
-
SHA1
a9ddfb9a263f04468ff5281dd50cdeb3c30fd11c
-
SHA256
e4ddbf2da60db701827309514f0844a0984ffefe43674265bfcf82cbc95e295b
-
SHA512
307c039a2176accef2bd4c00f662130911920bdd08d70ee1c3fe6c09f0da0a3a7e69fa7d668570ac15f8fc31d9899350187b927b98261c8ca631e4bb6bcfb7bd
-
SSDEEP
3072:K2eo01+iVTO9qk0UTTGL1qw+8LuUBcpGVzOUAwy1H1z:doTO9qk0UeL12QcpGVzOUxKVz
Malware Config
Signatures
Files
-
e4ddbf2da60db701827309514f0844a0984ffefe43674265bfcf82cbc95e295b.exe windows x86
bcda4a0a018c441f1ab7a4b777119e3f
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
ord690
ord187
ord588
MethCallEngine
ord669
ord593
ord594
ord595
ord598
ord520
ord306
ord307
EVENT_SINK_AddRef
DllFunctionCall
ord563
ord670
EVENT_SINK_Release
ord679
ord600
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord711
ord712
ord606
ord607
ord608
ord717
ord318
ProcCallEngine
ord535
ord644
ord645
ord681
ord578
ord100
ord687
ord616
ord617
ord618
ord619
ord541
Sections
.text Size: 88KB - Virtual size: 88KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 128KB - Virtual size: 156KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE