Static task
static1
Behavioral task
behavioral1
Sample
86d06d49e54d294e5994a0b4b184cf07a2d060635301bdc1b4a503654814fc30.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
86d06d49e54d294e5994a0b4b184cf07a2d060635301bdc1b4a503654814fc30.exe
Resource
win10v2004-20221111-en
General
-
Target
86d06d49e54d294e5994a0b4b184cf07a2d060635301bdc1b4a503654814fc30
-
Size
28KB
-
MD5
5a7289a48730f24ad0e346d0e7b18961
-
SHA1
08a0936eb7ed4dbb7445bd4d818213a0668750db
-
SHA256
86d06d49e54d294e5994a0b4b184cf07a2d060635301bdc1b4a503654814fc30
-
SHA512
195621903bf0eee6d1ca25eff69f77db88a5de52cece26fbdec7a8763fac81c9f20bb4eb1d474167417cfcb3a983206f9ae661658aca0c0f381388067b42b90c
-
SSDEEP
384:voPnqMh9RlotJMSAfcoEv2VKvgRQq2VsIZczT5iUU:vghh9RlcJMQPvSKvgRQq2VsIZ28U
Malware Config
Signatures
Files
-
86d06d49e54d294e5994a0b4b184cf07a2d060635301bdc1b4a503654814fc30.exe windows x86
496c29f9a12fc65a09c899199c6deb7c
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
ActivateKeyboardLayout
imm32
ImmIsIME
kernel32
FreeLibrary
winspool.drv
StartPagePrinter
ScheduleJob
advapi32
ImpersonateNamedPipeClient
msvbvm60
ord187
ord693
ord697
ord698
MethCallEngine
ord516
ord594
ord306
ord307
ord631
ord709
ord632
ord633
EVENT_SINK_AddRef
ord529
DllFunctionCall
ord563
EVENT_SINK_Release
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord711
ord608
ord717
ord318
ProcCallEngine
ord644
ord537
ord100
ord617
Sections
.text Size: 20KB - Virtual size: 17KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 5KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ