Static task
static1
Behavioral task
behavioral1
Sample
ae4f972ba0d850afae6e7ca05a57d7c090fafc7da52c1442f24974213999c2d8.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
ae4f972ba0d850afae6e7ca05a57d7c090fafc7da52c1442f24974213999c2d8.exe
Resource
win10v2004-20221111-en
General
-
Target
ae4f972ba0d850afae6e7ca05a57d7c090fafc7da52c1442f24974213999c2d8
-
Size
24KB
-
MD5
0eaffd321a01731ecc587ba88208ff5d
-
SHA1
0b11dba803b5cfb7d2dce87da92477dfacc2a004
-
SHA256
ae4f972ba0d850afae6e7ca05a57d7c090fafc7da52c1442f24974213999c2d8
-
SHA512
013bb0cfe158c32bb948546bc9613ea0c0c2c364bccd9ee4747008672a1f813998c079246dfe077a1eed2a56654f61639004bb5236b208c13a36ceb196d2fab9
-
SSDEEP
384:eNvU0YN7b46+GU43BtgiiHEMBtuTn7O4hZEbxw:KvVp6vNiJmBzEm
Malware Config
Signatures
Files
-
ae4f972ba0d850afae6e7ca05a57d7c090fafc7da52c1442f24974213999c2d8.exe windows x86
2b675bc84a22864f230a8789a2462768
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
ord585
ord187
ord587
MethCallEngine
ord516
ord661
ord306
ord307
ord631
ord709
ord632
EVENT_SINK_AddRef
ord529
DllFunctionCall
EVENT_SINK_Release
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord711
ord318
ord717
ProcCallEngine
ord644
ord645
ord100
ord687
ord616
ord541
Sections
.text Size: 16KB - Virtual size: 14KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ