Static task
static1
Behavioral task
behavioral1
Sample
83f1bbf173ed0b8ae97e398f1296158db0165773483886842d766020d10e2c56.exe
Resource
win7-20220812-en
General
-
Target
83f1bbf173ed0b8ae97e398f1296158db0165773483886842d766020d10e2c56
-
Size
1.2MB
-
MD5
df0f1c1f65b0a633864b16c8ca2a13c0
-
SHA1
4884e2c61951867d5f332103b224a8f34fd973bc
-
SHA256
83f1bbf173ed0b8ae97e398f1296158db0165773483886842d766020d10e2c56
-
SHA512
e7f2f73ec7490abecf0a9a19ea1c45c39b688347d829f496a718742e6e432279d1c4d86a1618c9038ea0a85b223ac97f01e2c847a82a8cceeb2013853a6f28f6
-
SSDEEP
3072:JoGLC3FLdU/XgDNpq2M8/8KYRooWEBpxARYasd1kWQhZsIPlB01UPmexFSikiItw:JwZx
Malware Config
Signatures
Files
-
83f1bbf173ed0b8ae97e398f1296158db0165773483886842d766020d10e2c56.exe windows x86
2a63df85c7656f80c0ab4eb0bdd8a778
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
ord696
MethCallEngine
ord516
ord628
ord522
ord631
ord632
EVENT_SINK_AddRef
DllFunctionCall
EVENT_SINK_Release
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord712
ord606
ord608
ord717
ProcCallEngine
ord644
ord537
ord572
ord681
ord100
ord581
Sections
.text Size: 1.2MB - Virtual size: 1.2MB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 4KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ