Static task
static1
Behavioral task
behavioral1
Sample
f79ee7729c1390ad330d23112d7bebafa1241d966d23d1bf935c0967ab94301d.exe
Resource
win7-20221111-en
General
-
Target
f79ee7729c1390ad330d23112d7bebafa1241d966d23d1bf935c0967ab94301d
-
Size
128KB
-
MD5
bf3bed02c44f045d89f6cf081d621788
-
SHA1
b787ae94ee14d72feee21638c88cc400a69b9887
-
SHA256
f79ee7729c1390ad330d23112d7bebafa1241d966d23d1bf935c0967ab94301d
-
SHA512
adbec4b8addfff66d0d045aace090b4533bfff38ddf8b3883b5acca35763487a000c866dca19b779a639d7b66d347e7ee26ed96f34e8ab26420651e6a84e4812
-
SSDEEP
1536:mY46WcKMhgGpsQvGM1BkeLUpDl9oisgi1NQ40Qqh2r24YeYVGsmmyxAnLlUz:D4hahgGpsQ/tLUFtsgiUtlK2TezhJ2+
Malware Config
Signatures
Files
-
f79ee7729c1390ad330d23112d7bebafa1241d966d23d1bf935c0967ab94301d.exe windows x86
6847500e086de2ef4cdc20f48f9a2864
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
MethCallEngine
ord516
ord560
ord632
ord526
EVENT_SINK_AddRef
DllFunctionCall
EVENT_SINK_Release
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord711
ord713
ord608
ord716
ord717
ProcCallEngine
ord644
ord681
ord100
Sections
.text Size: 24KB - Virtual size: 23KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 100KB - Virtual size: 3KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ