Static task
static1
Behavioral task
behavioral1
Sample
d0deb2eaf400a51db7478fd85ead89bed35d21ae3d4f3ce9f408d950c430f85a.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
d0deb2eaf400a51db7478fd85ead89bed35d21ae3d4f3ce9f408d950c430f85a.exe
Resource
win10v2004-20220812-en
General
-
Target
d0deb2eaf400a51db7478fd85ead89bed35d21ae3d4f3ce9f408d950c430f85a
-
Size
13KB
-
MD5
c6584787ac7bf5f4b3bf52de73481ea6
-
SHA1
163bc7dee66c6ab311052c009a2d8ec513afd967
-
SHA256
d0deb2eaf400a51db7478fd85ead89bed35d21ae3d4f3ce9f408d950c430f85a
-
SHA512
b5ceb22df2963a3b85221c1365261c236cbbeb8d9da2001965312351214e45cad44682fdf9fc1b9470a484962e5d0e525b027b7b4c3a6e6a954beab65314ffd9
-
SSDEEP
192:VPyTfQu/PaEMN1wXdXI14fNZyZ+4KGyDAfYYK:VuqEMN1wNY1mB4+lYK
Malware Config
Signatures
Files
-
d0deb2eaf400a51db7478fd85ead89bed35d21ae3d4f3ce9f408d950c430f85a.exe windows x86
f6b1990f5234d3de414e1a38c3133ad6
Headers
File Characteristics
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LINE_NUMS_STRIPPED
IMAGE_FILE_LOCAL_SYMS_STRIPPED
IMAGE_FILE_32BIT_MACHINE
Imports
user32
CallWindowProcA
kernel32
GetProcAddress
msvbvm60
MethCallEngine
ord516
ord525
ord632
EVENT_SINK_AddRef
DllFunctionCall
EVENT_SINK_Release
EVENT_SINK_QueryInterface
__vbaExceptHandler
ord711
ord608
ord717
ProcCallEngine
ord644
ord570
ord648
ord681
ord100
Sections
.text Size: 9KB - Virtual size: 9KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.rsrc Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ