Static task
static1
Behavioral task
behavioral1
Sample
dfd0cbda6c2f8633b0e3430671cdfb0f5d14b76bb59dc61b43fcb8d3800c027a.exe
Resource
win7-20221111-en
General
-
Target
dfd0cbda6c2f8633b0e3430671cdfb0f5d14b76bb59dc61b43fcb8d3800c027a
-
Size
587KB
-
MD5
0c5558c3f8dc5a5a097f8fc5bc45960c
-
SHA1
3685a431441dbb01acbf99c6dfcea8e72e7d09e9
-
SHA256
dfd0cbda6c2f8633b0e3430671cdfb0f5d14b76bb59dc61b43fcb8d3800c027a
-
SHA512
87c15f2fb70075769c4a31c9d8341fbbd03ae93f9f605ce9a4a019209832da44cb08eec2649c17f084f5e1442ff8e6771bd9d0fac37b8064d509dc0b4af9238f
-
SSDEEP
12288:+5NlAGA0vQ8TN3hKLDFgt/08MMnZEncof3G2:+5LAGTI8TNx2Fq/08MMZHm3f
Malware Config
Signatures
Files
-
dfd0cbda6c2f8633b0e3430671cdfb0f5d14b76bb59dc61b43fcb8d3800c027a.exe windows x86
f7ffb6e622296c9c5ab1e8c7f05d6294
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
MethCallEngine
ord632
ord526
EVENT_SINK_AddRef
DllFunctionCall
EVENT_SINK_Release
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord711
ord608
ord717
ProcCallEngine
ord644
ord570
ord100
Sections
.text Size: 296KB - Virtual size: 293KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ