Static task
static1
Behavioral task
behavioral1
Sample
0ad960edf4eaf2f9a7dade1ec3eb2362c51c53ff44716d4d68e9dc939543ddf1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0ad960edf4eaf2f9a7dade1ec3eb2362c51c53ff44716d4d68e9dc939543ddf1.exe
Resource
win10v2004-20221111-en
General
-
Target
0ad960edf4eaf2f9a7dade1ec3eb2362c51c53ff44716d4d68e9dc939543ddf1
-
Size
128KB
-
MD5
09fdf0f8cbf763bc9fad3c0cd571d335
-
SHA1
2fb51f6a85bd880d8751aa3f54682847af85f3e2
-
SHA256
0ad960edf4eaf2f9a7dade1ec3eb2362c51c53ff44716d4d68e9dc939543ddf1
-
SHA512
678f4caf47c12851e2a0401941a5d2bf46caa70e8a3c42627b6a9ba04c5dae95d952139cbe2fda115e2b88d1f6d08e117bd4984ba24bb0df895c17cffd394155
-
SSDEEP
1536:hq3q/t7UGSU+HwabFkDKdZ62Qs4zgzjKna6LZmBoQXR/l6Ge1UH:zVVSU+FbFgKdgs4zMj0TA5Le6
Malware Config
Signatures
Files
-
0ad960edf4eaf2f9a7dade1ec3eb2362c51c53ff44716d4d68e9dc939543ddf1.exe windows x86
b7150dae558ce0bf072fef0558edc5d0
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
_CIcos
_adj_fptan
__vbaVarMove
__vbaFreeVar
__vbaStrVarMove
_adj_fdiv_m64
_adj_fprem1
__vbaStrCat
__vbaSetSystemError
_adj_fdiv_m32
__vbaAryDestruct
_adj_fdiv_m16i
_adj_fdivr_m16i
_CIsin
__vbaChkstk
__vbaStrCmp
__vbaAryConstruct2
DllFunctionCall
_adj_fpatan
__vbaRedim
__vbaUI1I2
_CIsqrt
__vbaUI1I4
__vbaExceptHandler
_adj_fprem
_adj_fdivr_m64
__vbaFPException
__vbaUbound
_CIlog
__vbaErrorOverflow
_adj_fdiv_m32i
_adj_fdivr_m32i
__vbaStrCopy
__vbaFreeStrList
_adj_fdivr_m32
_adj_fdiv_r
ord100
__vbaAryLock
__vbaVarDup
_CIatan
__vbaStrMove
__vbaStrVarCopy
_allmul
_CItan
__vbaAryUnlock
_CIexp
__vbaFreeStr
Sections
.text Size: 28KB - Virtual size: 24KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 4KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 92KB - Virtual size: 88KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ