Static task
static1
Behavioral task
behavioral1
Sample
f858d6a308a50ffa5540952180634b572a152a03d87bb85e305610740e43db38.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f858d6a308a50ffa5540952180634b572a152a03d87bb85e305610740e43db38.exe
Resource
win10v2004-20220812-en
General
-
Target
f858d6a308a50ffa5540952180634b572a152a03d87bb85e305610740e43db38
-
Size
44KB
-
MD5
a1a6fbd66e8f3f3613189f455728f9f6
-
SHA1
bc4ce47e99779b120ddda0a06f78abc1e300cef1
-
SHA256
f858d6a308a50ffa5540952180634b572a152a03d87bb85e305610740e43db38
-
SHA512
d15e94d1403897ebd7efdbd6a8da446808acf9c552d60fe032bb60d38e92bbfe44cfaf617f7e2542514db16af435c2b4b4614927794e596e43ef17ae22970600
-
SSDEEP
768:cIrfwYoXMCpCoT07XskbXnChzYV6jU8h/:cwfw/MWvT4XskbXUzYYj3p
Malware Config
Signatures
Files
-
f858d6a308a50ffa5540952180634b572a152a03d87bb85e305610740e43db38.exe windows x86
a897d9b5a89d9fee1aed9ac5e504fb33
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
msvbvm60
MethCallEngine
ord517
ord593
ord598
ord526
EVENT_SINK_AddRef
DllFunctionCall
EVENT_SINK_Release
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord717
ProcCallEngine
ord644
ord570
ord685
ord100
ord616
ord581
Sections
.TEXT Size: 16KB - Virtual size: 12KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.DATA Size: - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.RSRC Size: 4KB - Virtual size: 4KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE